Nintendo Switch stock update and exploit news
With UK sales numbers confirming a healthy amount of Nintendo Switch consoles sold, the Japanese games giant appear to be turning their attentions to other important matters.
A steady stream of new Nintendo Switch stock continues to pop up at varying retailers, underscoring the continued appeal of the hybrid console.
Leading retailers in the UK and North America have seen boosts to both their physical and online stores, however it doesn't appear to have been enough to keep up with demand in recent weeks.
These three outlets remain the best chance for gamers to grab a Nintendo Switch console, although things are a little different in North America.
Physical stores are currently your best bet of grabbing a new console, calling around each week at places like Toys R Us, Gamestop and Best Buy can bear the most success.
But while the latest Nintendo Switch news points to restocks remaining limited for some, that hasn’t stopped the Japanese games giant asking for help to protect their new platform.
Nintendo Switch – Grey
Nintendo Switch Essential Games and Accessories REVEALED Sun, March 12, 2017
NINTENDO Switch fans will need to invest in these essential games and accessories to get the most out of the system,
Play slideshow NINTENDO 1 of 7
Nintendo Switch Essential Games and Accessories REVEALED
The company has posted a new listing on HackerOne, asking for help keeping the Nintendo Switch and 3DS systems safe.
Get Quotes on Home Insurance
“Nintendo’s goal is to provide a secure environment for our customers so that they can enjoy our games and services. In order to achieve this goal, Nintendo is interested in receiving vulnerability information that researchers may discover regarding Nintendo’s platforms,” the message explains.
“Currently, in the context of the HackerOne program, Nintendo is only interested in vulnerability information regarding the Nintendo Switch system and the Nintendo 3DS family of systems and is not seeking vulnerability information regarding other Nintendo platforms, network service, or server-related information.”
Nintendo will pay rewards to the first reporter of qualifying vulnerability information ranging from $100 USD to $20,000 USD.
However, only one reward per qualifying piece of vulnerability information will be awarded. Nintendo will determine at its discretion whether the vulnerability information qualifies for a reward as well as the amount of any such reward.
Nintendo does not disclose how the reward amount is calculated. Vulnerability information that is already known to Nintendo or the public, for example, does not qualify for a reward.
- Nintendo Switch stock news: Toys R Us, Gamestop, Amazon availability
- Nintendo Switch stock update, Zelda Breath of the Wild news and sales
Here are the areas Nintendo want people to investigate:
- Piracy, including:
- Game application dumping
- Copied game application execution
- Cheating, including:
- Game application modification
- Save data modification
- Dissemination of inappropriate content to children
Examples of vulnerabilities that Nintendo is interested in receiving information about:
- System vulnerabilities regarding Nintendo Switch
- Privilege escalation from userland
- Kernel takeover
- ARM TrustZone takeover
- Vulnerabilities regarding Nintendo-published applications for Nintendo Switch
- Userland takeover
- System vulnerabilities regarding the Nintendo 3DS family of systems
- Vulnerabilities regarding Nintendo-published applications for the Nintendo 3DS family of systems
- ARM11 userland takeover that doesn't require other hacks or tools ("secondary" exploits would be those that require other hacks or tools to be effective; those would be out of scope for this program)
- Hardware vulnerabilities regarding either the Nintendo Switch system or the Nintendo 3DS™ family of systems
- Low-cost cloning
- Security key detection via information leaks
Three bounties have already been payed out by Nintendo, however, the amounts and what the bug fixes were for have not been made public.
“A report is evaluated to be high quality if you show that the vulnerability is exploitable by providing a proof of concept (functional exploit code is even better).
“If you don’t yet have a proof of concept, or functional exploit code, we still encourage you to report to us sooner rather than later such that you do not to lose the opportunity to become the first reporter; you can then submit a proof of concept or functional exploit code later (within three (3) weeks of the initial report) and it will be considered to be a part of the report.”