Speaking of safety and custom channels, I'm wondering why everyone still uses the Trucha bug and risky cIOS to install channels?
Team Twiizers and The Homebrew Channel uses a different method to gain full access to install anything. That is how it can install HBC without trucha bug/custom IOS existing.
Yes, they've kept their HBC install exploit secret for ages, but they actually released
it in Jan 2010. That's why I am wondering why nobody uses the HBC method by now. That way we could have a WAD manager and custom channels installed WITHOUT ever needing a cIOS, *ever*.
It would be so much safer.
Full specifications and code for their exploit is at their blog. They held a contest to promote reverse engineering, where they agreed to release the exploit as soon as someone managed to reverse engineer the method they were using. Someone succeeded, so they kept their word and here we are. Full details are here: http://hackmii.com/2010/01/the-stm-release-exploit/
edit: Nevermind. I just noticed that the released exploit was one of their OLD install methods, which has since been patched by Nintendo. They have a new method now in the Hackmii installer, which is once again heavily obfuscated. They hint in the blog that it's quite similar to the last one (getting access to buggy syscalls and using them to overwrite the signature check function). Still, it would be so wonderful if one of those methods could be used by other channel installers such as WAD Manager. Imagine installing *anything* without needing a cIOS.
Team Twiizers are amazingly talented, they say that they have a whole pile of unused exploits so that they can just keep swapping every time Nintendo patches their Hackmii install method.