Last week, hacker group fail0verflow shared a photo on Twitter, showing that they had managed to run Linux on the Nintendo Switch.
This tweet followed after a previous one in January where they explained that their Switch coldboot exploit is a boot ROM bug, which as suggested in the name, is a piece of code containing instructions about the booting process stored in a read-only memory.
They also revealed that it is not possible to fix the flaw using patches in the current Switches.
In case it wasn’t obvious, our Switch coldboot exploit:* Is a bootrom bug* Can’t be patched (in currently released Switches)* Doesn’t require a modchip to pull offhttps://t.co/LLadlEmm44— fail0verflow (@fail0verflow) January 16, 2018
Earlier, they had also tweeted a scroller for the Switch.
While they have teased the exploit to the public, it may be a while before fail0verflow publicly release the details and code for their hack, as evidenced by the PS4 exploit that they demonstrated in 2016 and only revealed the details of over a year later.
Meanwhile, the Switch hacking community continues to make progress. After the 34C3 conference which left the console’s security wide open, it seems that it’s going to be easier for hackers to create homebrew software for the Switch and even pirate games, which could mean serious financial repercussions for Nintendo.
For those with technical knowledge who prefer the white hat route, however, Nintendo is still offering bounties on reports of vulnerabilities.