Sighax is here! A quick history lesson for those of you who are naive to Sighax. Sighax was first introduced to the world during the Nintendo Hacking talks at 33C3 in 2016 (video and a slide show link below for those who want to know full and well how Sighax works), but when they were talking about it, they told us that it would take them a while to get it right. Well now, that time is upon us and boy, it is oh so right!
To quote developers @derrekr6 and @sciresm directly:
‘sighax is a BootROM exploit for the Nintendo 3DS/2DS/New3DS. It exploits a vulnerability in the RSA signature parser and allows you to run fake-signed firmware on any console’
Yes, even means all iterations big and small old & new of the 3DS/2DS that are currently available. Of course, we can safely assume that if the Nintendo follows suit, the 2DS XL will not be terribly different than the current models and will also be susceptible to this hack.
Click here for the slide show if you want the basics from the video.
Twitter has been simply abuzz since the initial tweet from derrek. We had others chime in with hype, too such as @smealum and @qlutoo and so many more!
https://twitter.com/smealum/status/865754307450200065
https://twitter.com/qlutoo/status/865767226670014464
The developers give full credit to:
‘Thanks to plutoo (@qlutoo), yellows8 (@ylws8), smea (@smealum) and profi200. Without these people this release would not have been possible <3′
(Pictures credited to Nikki @Darthsternie)
Alright. Now we’ve gotten to the moment of truth! Ladies and gentleman, I present to you, Sighax; the final solution. When you’re there, you’ll find out that you can either install it from scratch, or if you already have an AL9H hack running on your 3DS/3DSXL/2DS/New3DS/New3DSXL you can replace it out right.
If you’re looking for the easiest possible method, use ScireM’s installer. It’s a bit more user friendly. That can be found here.
Stay tuned here on Hackinformer.com for all things 3DS and follow us on Twitter @Hackinformer !