• The wait is over! Caffeine, a Deja Vu-based warmboot exploit for the Nintendo Switch which allows users to launch any RCM payload, has been updated to support firmware 4.1.0. While this is already good per se, things become significantly more interesting if you consider that the exploit is also able to work on patched consoles, thus marking the first time said units are able to boot into full CFW! PegaScape has also been updated to include this new version of Caffeine, giving users an easy way to take advantage of it on their consoles.

    • However, if you want to try this yourself, be very wary when using homebrew able to make permanent modifications to your system's NAND. What works or is easily fixable on a fusče-gelče compatible Switch can make a patched unit permanently bricked. Do not enable AutoRCM under any circumstance on a patched console, you will brick if you do so. On the other hand, it is highly recommended to make a NAND backup as soon as possible and dump your keys using Lockpick_RCM. You can also set up emuMMC to run games and homebrew using any higher firmware you like while leaving sysNAND on 4.1.0 to boot Caffeine.

      Quoted from From PegaScape:
      Up to now, almost all homebrew for the Switch have been developed with the concept in mind that everyone has access to RCM. As such, most homebrew and especially RCM payloads have zero protection for users on IPATCHED units.

      Understand that this means it is incredibly easy to do something which, while considered normal on consoles with an exploitable RCM, can render IPATCHED Switches permanently inoperable. For your safety, you should avoid using the following homebrews on IPATCHED systems:

      • memloader
      • ChoiDujour
      • ChoiDujourNX (safe on emuMMC, do not use on sysnand)
      • Anything involving AutoRCM (briccmii, SX OS payload, etc)
        • Many homebrews have been updated to block enabling AutoRCM on IPATCHED units including Hekate and ChoiDujourNX. Still exercise very high caution.

      • Anything which writes to sysNAND without proper security or verification in place

      Upon using PegaScape to reboot into a payload on an IPATCHED Switch, you should immediately create a NAND backup with Hekate and dump all of your keys (especially BIS keys) with Lockpick_RCM. Understand that by not dumping these, there is no recovery method for your Switch should anything cause it to fail to boot.

      You should strongly consider using an emuMMC for all CFW usage to avoid any damage to your Switch.

      That said, celebrate! We can now run CFW on IPATCHED Switches!
      Click to expand...
      While there is no detailed guide on how to set up the exploit yet, user-friendly tutorials are said to be on their way for anyone interested.

      EDIT: PegaScape has now been released publicly, see the second Source link for more info.

      Source 1 (original NOTE: ReadMe has not been updated yet / precompiled binaries)
      Source 2