Downgrade prevention has been a cat-and-mouse game between consumers and companies since the inception of remote updates. The Switch adopts a worrisome-strategy of preventing downgrades by permanently modifying your device every time it updates. While this isn’t a new concept (the Xbox 360 was doing it back in 2007), it is part of a greater effort to prevent end users from modifying their devices to their liking. Nintendo firmware The Nintendo Switch was released on March 3, 2017, and is currently on version 5.0.2 The Nintendo Switch use an SoC, which comes with a fuse driver. This allows it to programmatically blow fuses — permanently modifying the device, making it impossible to revert to a previous state. Nvidia Tegra X1 How It Works The boot loader verifies a specific fuse, , to prevent downgrading.[1] Each software version expects a different number of fuses to be blown — if more than is expected, it fails to boot, and if less, it’ll blow those fuses and then proceed to boot. Blowing a fuse is irreversible— once it’s been set it can never be undone. It’s theoretically possible to physically modify the SoC and replace the fuses, but it’s so prohibitively invasive and expensive that it’s not a real option. FUSE_RESERVED_ODM7 There are 256 bits in the set of ODM_RESERVED fuses, and there are 8 ODM_RESERVED. This allows for 32 fuses, or 32 future FW versions (provided they burn a fuse on every major release). Workarounds Just this week the . This is not a remotely patchable exploit, which means that all ~15 million devices currently out are vulnerable and will continue to be vulnerable for their lifespans. fail0verflow also released a , although as of this writing it is not yet ready for the public. first serious exploit of the Switch BootROM was released Linux side loader [1] http://switchbrew.org/index.php?title=Fuses#Anti-downgrade
Share Your Thoughts