1
0
Fork 0
mirror of https://github.com/Scandal-UK/Incognito_RCM.git synced 2024-11-09 13:41:44 +00:00
Incognito_RCM/README.md
2020-05-31 22:34:34 +01:00

2.3 KiB

Incognito_RCM (patched)

Incognito_RCM is a bare metal Nintendo Switch payload that derives encryption keys for de- and encrypting PRODINFO partition (sysnand and emummc) and wiping personal information from your Nintendo Switch as to go online while worrying slightly less about a ban. It has a builtin backup and restore functionality.

It is heavily based on Lockpick_RCM and takes inspiration from incognito.

Massive Thanks to CTCaer, shchmue and blawar!

This project is in early stage, so have a nand backup!!

Patch note

Scandal-UK: I have maintained this project with code from projects by CTCaer and schmue. I take no credit for the code - I have just updated it where necessary so that it builds with the latest tools, has the improvements made in Hekate and works with the latest firmware as intended. Report any issues or contact me on GBATemp (scandal_uk).

Usage

  • Launch Incoginito_RCM.bin using your favorite payload injector
  • Use menu to make a backup! (Will be written to sd:/prodinfo_sysnand.bin and sd:/prodinfo_emunand.bin respectively)
  • Choose either Incognito (sysNAND) or Incognito (emuMMC) to wipe personal information
  • If you ever want to revert, choose restore menu points

Screenshots

Main Incognito
Backup Restore

Building

Install devkitARM and run make.

Known Issues

  • Chainloading from SX will hang immediately due to quirks in their hwinit code, please launch payload directly

Disclaimers

  • This application does not remove all personal information from your Switch, and should not be treated as a true preventative measure against getting banned.

  • ALWAYS have a NAND backup. I am not responsible for any bricks or bans. Use at your own risk, as this is an experimental program.

  • This application backs up your PRODINFO to the SD card. You should keep this backup in a more secure location, and not leave it on the SD card where it could be subject to corruption or be read by malicious applications.