Changes

503 bytes added ,  22:20, 4 February 2021
no edit summary
Line 4: Line 4:     
==Contents of the archive==
 
==Contents of the archive==
The archive contained dumps of the "bb" and "ng" development trees from [[Acer Cloud Technology|BroadOn]]'s servers, likely sent from [[Acer Cloud Technology|BroadOn]] to Nintendo. The "ng" tree, inside a TAR file named "depotrvl", contained a CVS repository with the source code for the Wii's [[IOS|input output system]], source code for Wii factory software, the source code for [[boot0]], [[boot1]], and [[boot2]], internal documents and PowerPoint presentations related to [[Acer Cloud Technology|BroadOn]] and Nintendo and the development of the Wii, and much more.
+
The archive contained dumps of the "bb" and "ng" development trees from [[Acer Cloud Technology|BroadOn]]'s servers, likely sent from [[Acer Cloud Technology|BroadOn]] to Nintendo. Here is a list of things that have been found in this data:
 +
 
 +
* Source code for [[boot0]], [[boot1]] and [[boot2]]
 +
* Source code for [[IOS]]
 +
* Source code for the [[DVD]] and [[EXI]] libraries from the [[Wii SDK]]
 +
* Block diagram/datasheets for every Wii system component & Verilog for AES/SHA
 +
* Documents from BroadOn describing feature planning and implementation, APIs, and documents relating to internal software
 +
* Documents from 2004-2006 describing plans for the implementation of the Wii
 +
* Miscellaneous Nintendo data, including an internal WPAD SDK from 2005 and a Wii Overview from RVL_SDK 1.0
 +
* Internal GameCube documents, including a physical disc layout
 +
* iQue related data, located in the "bb" tree, including various documents, tools, and huge CVS code repositories
 +
 
 +
People have claimed to have found partial Super Mario 64 source code inside the contents of the "bb" tree.
    
==sd_boot==
 
==sd_boot==
These leaked files led to the discovery of a software tool used in the [[Wii Factory Process]] called sd_boot. This contained a vulnerability, which was found by Fullmetal5 and could be used to install BootMii as boot2 on [[Bollywood]] Wii consoles with a patched boot1.
+
These leaked files also led to the discovery of a software tool used in the [[Wii Factory Process]] called sd_boot. This contained a vulnerability, which was found by Fullmetal5 and could be used to install BootMii as boot2 on [[Bollywood]] Wii consoles with a patched boot1.
    
{{DEFAULTSORT:unsorted.7z}}
 
{{DEFAULTSORT:unsorted.7z}}