Fundraiser: Difference between revisions
No edit summary |
No edit summary |
||
Line 27: | Line 27: | ||
= How likely is this going to help progress? = | = How likely is this going to help progress? = | ||
It is not possible to give a clear answer on this until the 3DS SoC chip has been decapped. But consider the success story about the SNES decapping [http://byuu.org/articles/emulation/decap here]. We have a team of proven experts, anxious to have a very thorough look inside the SoC of the 3DS | It is not possible to give a clear answer on this until the 3DS SoC chip has been decapped. But consider the success story about the SNES decapping [http://byuu.org/articles/emulation/decap here]. There is no 100% guarantee that we will have the same success story, but we won't know until we try. We have a team of proven experts, anxious to have a very thorough look inside the SoC of the 3DS. | ||
The most likely focus points will be: | The most likely focus points will be: | ||
* the | * the boot ROM, possibly containing flaws which allow us to take control of the system | ||
* secret keys, hidden in hardware, used in cryptographic operations | * secret keys, hidden in hardware, used in cryptographic operations | ||
* secret algorithms, implemented in hardware to obscure information | * secret algorithms, implemented in hardware to obscure information |