לקבלת תמיכה באנגלית, תבקשו עזרה בNintendo Homebrew על Discord.
If you appreciate this guide, we accept Donations.

קריאה דרושה

To install boot9strap on your device, we derive your device’s unique encryption key. To accomplish this, we use a tool called Seedminer to calculate the data encryption key (movable.sed) for your device.

For information on how Seedminer works, see this presentation.

This method uses a powerful graphics card to perform the calculations needed. A volunteer-run website is used for the purpose of assisting you with this method.


חלק I - הכנות

  1. תכניסו את ה-SD שלכם למחשב
  2. Navigate to the Nintendo 3DS folder on your SD card
  3. Copy the 32 character long name of the folder you see inside Nintendo 3DS
    • Do not go inside any more folders
    • If you see multiple 32 character long folders, follow these instructions
    • You can ignore the private folder if you have it

  4. Paste your 32 character long folder name into a document you can reference later
    • This folder name is also known as your “ID0”
  5. תפעילו את המכשיר
    • Your SD card does not need to be inserted at this point
  6. Go to your Friend List (the orange Face Icon in the top row of your HOME Menu)
    • If you receive an error and are kicked out of the menu, you either must create a new Mii or your device cannot connect to Nintendo’s servers (due to a ban or connection issues)
  7. Find your Mii profile, then find the “Friend Code” field on the top screen

Section II - Seedminer

  1. Open Bruteforce Movable on your computer
    • This site can automate the retrieval of movable_part1.sed (using a bot 3DS console) and the breaking of your device’s DSiWare encryption (using a volunteer’s computer to run Seedminer)
    • If the site isn’t working, join Nintendo Homebrew on Discord and ask (in English) for someone there to assist you
  2. Enter your device’s Friend Code (with no spaces or dashes) into the “Your friend code” field
  3. Paste your device’s 32 character long folder name into the “Your ID0” field
    • Do not attempt to enter the ID0 by hand. Ensure the ID0 is entered correctly by copying and pasting it from where you saved it in the previous section
  4. Select “Go”
    • If the site immediately goes to step 4, the website has already correctly processed your bruteforce request. You can download your movable.sed file and continue to the next section. You do not need to re-add the bot
  5. When prompted, use the “Register Friend” button on your device to add the friend code of the bot 3DS console
    • The name of the bot does not matter
  6. Wait for the site to update
    • If it does not, wait a few minutes before refreshing the page once
  7. Once the site processes your information, the site will continue to Step 2: Bruteforce automatically
  8. Wait for the remainder of the process to complete
    • This is usually fast (1-5 minutes) but in some cases, can take up to half an hour
    • During this process, the bot you added may not show up on your 3DS. As long as the website updates, this is not an issue
    • If you are still waiting after half an hour, join Nintendo Homebrew on Discord and ask (in English) for someone there to assist you
  9. When the process is completed, download your movable.sed file from the site
    • Keep this file as you will need it in the upcoming pages

Next Steps

Once you have your device’s encryption key (movable.sed), you will use it in conjunction with other exploits to install custom firmware on your 3DS. Select an exploit below.

This method of using Seedminer for further exploitation uses your movable.sed file to write a custom save file for Pokémon Picross, which can then be used in conjunction with universal-otherapp to install custom firmware.

This route requires the Pokémon Picross application (free on eShop), and thus requires eShop access and a 3DS with a region of USA, EUR, or JPN.

Continue to Installing boot9strap (PicHaxx)

Installing boot9strap (unSAFE_MODE)

This method of using Seedminer for further exploitation uses your movable.sed file to take advantage of exploits in the SAFE_MODE firmware present in all 3DS units.

This route is only recommended if you are for some reason unable to follow the PicHaxx + universal-otherapp route, such as lack of eShop access or using a Korean 3DS.

Continue to Installing boot9strap (USM)

Taiwan consoles only

If you have a Taiwanese device (indicated with a T at the end of the system version, such as 11.15.0-39T), you must follow this route. Other regions may not follow this route.

Continue to BannerBomb3 + Fredtool (TWN)