Changes

Jump to navigation Jump to search

Nintendo 3DS emulators

33 bytes added, 22:03, 23 October 2022
no edit summary
{{for|other emulators that run on 3DS hardware|Emulators on 3DS}}
 
The '''[[wikipedia:Nintendo 3DS|Nintendo 3DS]]''' is an eighth-generation handheld game console by Nintendo, released on March 27, 2011 for {{inflation|USD|249|2011}}. The original model and the 2DS had a dual-core ARM11 MPCore at 268 MHz and a single-core ARM9, 128MB of RAM and 6MB of VRAM, and a DMP PICA200 GPU. The New 3DS and New 2DS XL models upgrade this to an 804 MHz quad-core ARM11 and 256MB of RAM, along with an extra pair of shoulder buttons and a right analogue stick.
The game changer was the sighax exploit, allowing to dump the 3DS bootrom which includes these encryption keys. This file can be downloaded from the [[Emulator Files#Nintendo 3DS|Emulator Files]] page. You can then use a program like '''[https://gbatemp.net/threads/tutorial-extract-decrypt-games-nand-backups-and-sd-contents-with-fuse-3ds.499994/ fuse-3ds]''' to decrypt games using this file. Simply place boot9.bin in the same folder, run the program, mount the encrypted .cia or .3ds, and find the '''decrypted.cxi''' file inside (usually in the first folder). Citra should be able to load this file without issues.
Due to these keys being available, Citra can now play encrypted games (3ds or CIA) without decrypting them. Read this page[https://citra-emu.org/wiki/aes-keys/this page]. Then, go to this reddit page and copy the code from second comment (credit floppydoppy2)[https://www.reddit.com/r/CemuPiracy/comments/gpo2ey/aes_key_nintendo_3ds_title_keys_for_citra/second comment](credit floppydoppy2). Copy it and make a new .TXT file named '''aes_keys.txt'''. Place this txt file in the sysdata folder of Citra's user directory. This key file is already included in the 3DS Shared Data download in the [[Emulator files#Nintendo_3DS|Emulator Files ]] page.  
{{Nintendo}}
1,009
edits

Navigation menu