Author Topic: Could the TI-Nspire be hacked via the 84+ emulator (through ASM programs)?  (Read 2438 times)

0 Members and 1 Guest are viewing this topic.

Offline DJ Omnimaga

  • Clacualters are teh gr33t
  • CoT Emeritus
  • LV15 Omnimagician (Next: --)
  • *
  • Posts: 55943
  • Rating: +3154/-232
  • CodeWalrus founder & retired Omnimaga founder
    • View Profile
    • Dream of Omnimaga Music
There is something I've been wondering while messing around with Axe and running into funky crashes on my TI-Nspire (such as the top of the Nspire LCD turning into garbage (not in 96x64 blocks but rather 320x240 pixels res blocks, if you get what I mean)). When such crash happens, it means crap is being drawn on the LCD by individual pixels basis, meaning stuff is done in the memory in a different way than on a z80 calc, right?

Well, what I've been wondering is: could the TI-Nspire be hacked in TI-84+SE mode through "bad" ASM programs (ran with Asm() command) to be able to run native ARM9 code this way? Has anyone given this a try?

that said, this method would only work on a regular TI-Nspire, though (the one with the 84+ keypad).

Offline BrandonW

  • LV4 Regular (Next: 200)
  • ****
  • Posts: 115
  • Rating: +38/-1
    • View Profile
Yes, I was digging into this from day one.

While there are emulator exploits, there's nothing to allow native ARM code execution. And now that we can disassemble the 84+SE emulator directly through the Nspire's decrypted OS, we're even more sure there's no exploit like this.

Never impossible, but very very very unlikely.

Offline DJ Omnimaga

  • Clacualters are teh gr33t
  • CoT Emeritus
  • LV15 Omnimagician (Next: --)
  • *
  • Posts: 55943
  • Rating: +3154/-232
  • CodeWalrus founder & retired Omnimaga founder
    • View Profile
    • Dream of Omnimaga Music
Aaaah ok, thanks for the info. :)