Changes

Jump to navigation Jump to search

Nintendo 3DS emulators

43 bytes added, 5 March
m
Encryption: replaced link to citra-emu's now defunct wiki to an archive.org copy
The game changer was the sighax exploit, which allowed for the dumping of the 3DS bootrom, which includes these encryption keys. This file can be downloaded from the [[Emulator Files#Nintendo 3DS|Emulator Files]] page. You can then use a program like '''[https://gbatemp.net/threads/tutorial-extract-decrypt-games-nand-backups-and-sd-contents-with-fuse-3ds.499994/ fuse-3ds]''' to decrypt games using this file. Simply place boot9.bin in the same folder, run the program, mount the encrypted CIA or 3DS, and find the '''decrypted.cxi''' file inside (usually in the first folder). Citra should be able to load this file without issues.
Due to these keys being available, Citra can now play encrypted games (3DS or CIA) without decrypting them. Read [https://web.archive.org/web/20240229064914/https://citra-emu.org/wiki/aes-keys this page]. Then, go to this Reddit page and copy the code from the [https://www.reddit.com/r/CemuPiracy/comments/gpo2ey/aes_key_nintendo_3ds_title_keys_for_citra second comment] (credit floppydoppy2). Copy it and make a new TXT file named '''aes_keys.txt'''. Place this TXT file in the sysdata folder of Citra's user directory. This key file is already included in the 3DS Shared Data download in the [[Emulator files#Nintendo_3DS|Emulator Files]] page.
==Emulation issues==
97
edits

Navigation menu