“Mariko” is the second (and current) retail version of the Nintendo Switch, which patches the hardware security vulnerability used for Nintendo Switch hacks. Long story short, if you own a “Mariko” version of the Nintendo Switch (and, if you bought it semi-recently, it’s practically guaranteed this is the case), your device cannot be hacked today, with the same tools that owners of a first-generation Switch can enjoy.
This could change soon, as it seems hackers have been able to access early stages of the console’s boot process, and might be able to port the existing selection of hacking tools to the console.
The hacker added details on how the Mariko boot process attempts to prevent injection of code, such as memory being intialized with bits that would be interpreted as an infinite loop if jumped into by an attack attempt.
It is not
known certain at the moment how SciresM has accessed the boot process of the Mariko units, whether it is through a hardware of software vulnerability*. In any case, the race might be on between the open source community and for-profit Team-Xecuter, who already started taking preorders for a dongle that allegedly hacks the latest Mariko units and Switch Lite consoles.
Source: SciresM on Twitter
* update: some of his previous tweets imply that he might have leveraged Team-Xecuter’s upcoming dongle to look into the console’s firmware.