Latest Versions

Switch Hacking Terminology

Terminologies

  • Applet Mode

    The Homebrew Menu runs in Applet Mode if you access it without using a title override and granting additional memory access.

  • Atmosphere

    Custom Firmware for the Switch.

  • AutoRCM

    A method that corrupts parts of your boot0 and causes the Switch to boot into RCM automatically.

  • BOOT0 & BOOT1

    Two partitions of the Switch NAND.

  • CFW

    Custom Firmware.

  • Daybreak

    A homebrew app used to update firmware offline.

  • Dongle

    A device that can be inserted into your Switch to push payloads to your Switch to boot into CFW and tools.

  • emuMMC

    An emulated copy of Switch's internal storage, which is saved on microSD card. Includes all the content required for running the Switch, including firmware, data storage, system settings and games.

  • emuNAND

    Emulated NAND (see EmuMMC).

  • fusee.bin

    Atmosphere CFW bootloader that loads KIPs.

  • Fuses

    Microscopic fuses located in the Tegra X1(+) die, they’re primarily used for storing hardware information. Nintendo also uses them for anti-downgrade by burning one every few updates, if too many are burnt the kernel panics when the firmware does not match the expected fuse count.

  • Fusée Gelée

    The RCM exploit.

  • Hekate

    A bootloader for the Switch with lots of useful features and tools.

  • Horizon/HOS

    The Switch Operating System.

  • Jig

    A small object, when inserted into the right joy-con rail it shorts out pins 10 and a ground pin, allowing you to enter recovery mode (RCM).

  • KIP

    'Kernel Initial Programme' - Programmes launched directly by the kernel very early in the boot process.

  • NAND

    The Switch internal memory.

  • NCA

    'Nintendo Content Archive' - Nintendo’s official content archive format.

  • NSO

    'Nintendo Static Object' - Nintendo’s main executable format for games, sysmodules, applets, etc.

  • NPDM

    Contains various information about a programme such as permissions, whether the program is 32bit or 64bit, etc.

  • NRO

    The executable file format used by the Horizon OS, also the format of Homebrew applications which run on the Switch.

  • NSP/NSZ

    'Nintendo Submission Package', they're used by SDK tools and they're used now by whatever because the first 'title installer' was a leaked SDK tool and people just stuck with them. NSZ is a compressed NSP file.

  • NX Firmware

    Official Firmware.

  • OFW

    Original Firmware.

  • package1/pkg1/pk11

    Signed and encrypted binary located in BOOT0/1 that contains Nintendo’s bootloaders, secure monitor, and warmboot firmware.

  • package2/pkg2/pk21

    Signed and encrypted binary located in the BCPKG2-* partitions that contains Nintendo’s kernel and KIP processes.

  • Payload

    A programme that is loaded into the Switch's memory and then run, allowing you to boot into CFW and tools.

  • RCM

    Recovery Mode.

  • RCM Loader

    A device that can be inserted into your Switch to push payloads to your Switch to boot into CFW and tools.

  • SDK

    Software Development Kit.

  • Signed Code/Unsigned Code

    Normal code is 'signed' by a special key that only they should have access to. Unsigned code is not signed by this key and cannot run unless done so by an exploit.

  • Sigpatches

    Short for Signature Patches. These necessary files allow you to launch unsigned applications/games from the home screen.

  • System Modules/Sysmodules

    System background processes.

  • SX OS

    Paid CFW that is no longer receiving updates.

  • sysMMC

    The Switch contents stored on the internal memory.

  • sysNAND

    See sysMMC.

  • V1 Erista

    T210 (first gen 2017 Switch, both patched and unpatched)

  • V2 Mariko

    T214 (the 2019 "New" Switch with better battery life)

  • XCI/XCZ

    NX Card Image format, the extension for gamecards, also the format of files generated when gamecards are dumped. XCZ is a compressed XCI file.