I've created a little program for the 84+, 84+SE, and (yes) 84+CSE to receive unsigned OSes -- any hardware revision, any boot code version, any OS version, any link cable type, any connectivity software, no questions asked.
It works by unlocking Flash, copying the boot code into RAM, patching it so it can run from there, removing the 2048-bit RSA signature check from the RAM copy, and then passing control to it.
It's at http://brandonw.net/calcstuff/uosrecv.zip
Obligatory picture:
I should've thought of it years ago -- as long as we can unlock Flash, this can work. I have a list of 12 exploits (which all work differently) queued up in case they actually fix something, so I think this is here to stay.
I'm hoping to create some sort of wiki/page to explain things like this that aren't really explained anywhere, such as 1) running unsigned OSes on any model, 2) recovering from a brick (no matter what kind), etc.
It works by unlocking Flash, copying the boot code into RAM, patching it so it can run from there, removing the 2048-bit RSA signature check from the RAM copy, and then passing control to it.
It's at http://brandonw.net/calcstuff/uosrecv.zip
Obligatory picture:
I should've thought of it years ago -- as long as we can unlock Flash, this can work. I have a list of 12 exploits (which all work differently) queued up in case they actually fix something, so I think this is here to stay.
I'm hoping to create some sort of wiki/page to explain things like this that aren't really explained anywhere, such as 1) running unsigned OSes on any model, 2) recovering from a brick (no matter what kind), etc.