Part 7/11:
While Buchanan's achievement is notable, it’s important to clarify what it does—and doesn’t—imply about the current security state of the Switch 2. His exploit operates within userland, meaning it exploits vulnerabilities in applications or processes without affecting the core operating system or hardware integrity.
This is not yet a full jailbreak. To achieve complete control, an attacker would need to break through multiple security layers, including:
Gaining kernel-level exploitability, which would allow modifications to the operating system itself.
Circumventing hardware security modules like the HSM (Hardware Security Module), responsible for cryptographic verification of firmware and critical system components.