- 精华
- 3
- 帖子
- 12894
- 威望
- 7 点
- 积分
- 14464 点
- 种子
- 514 点
- 注册时间
- 2010-5-20
- 最后登录
- 2024-2-6
|
本帖最后由 lucky☆star 于 2015-12-18 09:36 编辑
https://gbatemp.net/threads/wii- ... ge-672#post-5869658
Time to clear the air again. :rolleyes:
The following statements are facts:
- I have successfully compromised the Wii U's IOSU;
- The exploit being used works from 2.0.0 up to 5.5.0, but it obviously needs to be ported for each firmware;
- The exploit doesn't need PPC kernel access, so the new kernel exploit won't have to be released.
I want to do some kind of Christmas surprise yes, but take that with a grain of salt. I can't promise I will have the time to get everything ready by then and I'm not disclosing what will be released.
Keep in mind that releasing the exploit "as-is" is pointless, so it will have to be ported first and most likely obfuscated so it will take a little longer to patch. It's also worth noting that I will have to develop an easy way to block updates so no one updates past 5.5.0 by accident.
If you don't believe in anything stated above, that's not my problem. The best (and easiest) thing to do is wait and see.
下面说的是事实:
- 我已经成功地损害了Wii U的的IOSU;
- 该漏洞工作在2.0.0至5.5.0,但它显然需要移植到每个固件;
- 该漏洞并不需要PPC内核访问,因此新内核漏洞不会被释放。
我想做某种圣诞惊喜,是的,但也采取保留。我不能保证我将有时间做好一切准备,我不会透露哪些将被释放。
请记住,释放漏洞(exploit)“原样”是没有意义的,所以它第一步必须要移植,也是最容易混淆处理,这样会需要更长的时间来修补(意思是说任天堂修补漏洞更困难)。另外值得一提的是,我将要开发一个简单的方法来阻止更新,防止有人意外更新到5.5.0。
如果你不相信如上所述,那不是我的问题。最好的(和最简单的)要做的是等待和观望。 |
|