Switch Hacking Terminology
Terminologies
-
Applet Mode
The Homebrew Menu runs in Applet Mode if you access it without using a title override and granting additional memory access.
-
Atmosphere
Custom Firmware for the Switch.
-
AutoRCM
A method that corrupts parts of your boot0 and causes the Switch to boot into RCM automatically.
-
BOOT0 & BOOT1
Two partitions of the Switch NAND.
-
CFW
Custom Firmware.
-
Daybreak
A homebrew app used to update firmware offline.
-
Dongle
A device that can be inserted into your Switch to push payloads to your Switch to boot into CFW and tools.
-
emuMMC/emuNAND
An emulated copy of Switch's internal storage, which is saved on microSD card. Includes all the content required for running the Switch, including firmware, data storage, system settings and games.
-
fusee.bin
Atmosphere CFW bootloader that loads KIPs.
-
Fuses
Microscopic fuses located in the Tegra X1(+) die, they’re primarily used for storing hardware information. Nintendo also uses them for anti-downgrade by burning one every few updates, if too many are burnt the kernel panics when the firmware does not match the expected fuse count.
-
Fusée Gelée
The RCM exploit.
-
Hekate
A bootloader for the Switch with lots of useful features and tools.
-
Horizon/HOS
The Switch Operating System.
-
Jig
A small object, when inserted into the right joy-con rail it shorts out pins 10 and a ground pin, allowing you to enter recovery mode (RCM).
-
KIP
'Kernel Initial Programme' - Programmes launched directly by the kernel very early in the boot process.
-
NAND
The Switch internal memory.
-
NCA
'Nintendo Content Archive' - Nintendo’s official content archive format.
-
NSO
'Nintendo Static Object' - Nintendo’s main executable format for games, sysmodules, applets, etc.
-
NPDM
Contains various information about a programme such as permissions, whether the program is 32bit or 64bit, etc.
-
NRO
The executable file format used by the Horizon OS, also the format of Homebrew applications which run on the Switch.
-
NSP/NSZ
'Nintendo Submission Package', they're used by SDK tools and they're used now by whatever because the first 'title installer' was a leaked SDK tool and people just stuck with them. NSZ is a compressed NSP file.
-
NX Firmware
Official Firmware.
-
OFW
Original Firmware.
-
package1/pkg1/pk11
Signed and encrypted binary located in BOOT0/1 that contains Nintendo’s bootloaders, secure monitor, and warmboot firmware.
-
package2/pkg2/pk21
Signed and encrypted binary located in the BCPKG2-* partitions that contains Nintendo’s kernel and KIP processes.
-
Payload
A programme that is loaded into the Switch's memory and then run, allowing you to boot into CFW and tools.
-
RCM
Recovery Mode.
-
RCM Loader
A device that can be inserted into your Switch to push payloads to your Switch to boot into CFW and tools.
-
SDK
Software Development Kit.
-
Signed Code/Unsigned Code
Normal code is 'signed' by a special key that only they should have access to. Unsigned code is not signed by this key and cannot run unless done so by an exploit.
-
System Modules/Sysmodules
System background processes.
-
SX OS
Paid CFW that is no longer receiving updates.
-
sysMMC/sysNAND
The Switch contents stored on the internal memory.
-
V1 Erista
T210 (first gen 2017 Switch, both patched and unpatched)
-
V2 Mariko
T214 (the 2019 "New" Switch with better battery life)
-
XCI/XCZ
NX Card Image format, the extension for gamecards, also the format of files generated when gamecards are dumped. XCZ is a compressed XCI file.