Separate names with a comma.
Discussion in 'Switch - Backup Loaders & Modchips' started by Plague1s, Jul 12, 2018.
So there's another hardware exploit that can be used on pre-mariko systems.. that's nice to know at least
Something doesn't sit right with me..
Yeah, i thought something felt off about this.
Isn't that the serial though? The hardware identifier they used in the vid description seems to match? I'm probably misreading some things here, so some clarification would be great.
Definitely need an explanation as to what we're seeing. Even the description doesn't have an identifier (outside of the model). Would also be great if they showed them attempting to load payloads through the computer or an android device.
They are using the usual method of payload (and this is definitely patched - quite surprised it allows payload execution). Perhaps they are modifying something from within horizon first via some unknown exploit in order to allow this?
What we are referring to is the serial. You can see it very clearly at the 2:49 mark. The identifier used in the video title is the model number which does not denote a patched Switch unit.
No the unit they are running is a XAJ7003+ which is actually not patched according to what other users have reported. It is the XAJ7004+ that is actually patched so this is false information they are spreading.
EDIT: XAJX004+ does not seem to the only indicator for patched Switch Units. However, TX has still not demonstrated that the XAJX003+ they used is patched in any capacity.
Oh, thanks for that. Was expecting them to show the serial earlier in the vid. So, my bad. :x
So this is basicly false advertising
Damn TX putting it down!
aaaand this backfired lmao
Here is the evidence to back up that what they are running is a non-patched Switch unit
babies power,hell yeah!!
Quick rush to PR.
This is nothing spectacular. They are very clearly running a non-patched Switch unit based on the serial number. This is misleading information at the very least.
I'd place the blame more on confusion on how to identify if a new Switch is patched or not, I don't think they're trying to intentionally deceive people. They're literally willing to pay people to send them their patched consoles so they can investigate.
Extremely misleading? Yeah. Intentionally misleading? I don't think so.
I have a feeling, though, that TX isn't really going to have a lot of luck getting the existing method of launching payloads via RCM to work on the patched consoles.
I'm not one to judge whether or not they are purposefully misleading people or not. I am merely providing evidence to refute their claims until disproven otherwise. Worst case scenario is that people everywhere else will argue whether or not what they are showing in the video is real or not without the whole story. I am only trying to prevent that.
EDIT: I've updated the post you quoted so that I only stick to what we do know at the current time. While there may be a chance they do have a workaround for the patched units, they still have not demonstrated it properly.
The serial number is just an indicator, not a guarantee. But yeah the video is kinda shady... They should have shown first how they send a normal fusee-gelee payload (-> wouldn't work) and then the SX Pro.
This backfired so hard, extremely misleading lol.