Anyone who's looked into Switch CFW has seen the terms EmuMMC and SysMMC. Common wisdom says "EmuMMC is safer" — but for our Switch loader, the opposite is true. Here's why.
SysMMC is the original system partition baked into your Switch. It's what you boot into normally. It lives on the main NAND chip (eMMC) inside the console.
EmuMMC is a clone of SysMMC stored on the SD card. A second virtual "OS partition" you can boot into instead.
Its original purpose was safety: "if I break something with CFW, my main system stays clean". The standard hacker workflow has always been "SysMMC for daily/online use, EmuMMC for CFW experiments".
| SysMMC | EmuMMC | |
|---|---|---|
| Location | Console NAND | SD card |
| Stock state | ✓ pristine | ✗ hacking traces |
| Boot speed | Fast | Slow (SD-bound) |
| Detection risk | see below | see below |
| Switch loader (this site) | ✅ recommended | ❌ BAN |
Nintendo's servers (NPNS / auth API) inspect telemetry your Switch sends at boot. EmuMMC betrays itself via:
Any one of these = a red flag in your console's record.
Playing Apex (or any online game) via the loader necessarily routes traffic through Nintendo's services. With EmuMMC traces present:
Our loader is designed to run under Atmosphère on SysMMC. Atmosphère is required (the loader is an hbmenu app), but no EmuMMC. Booted on SysMMC, Nintendo's telemetry sees:
Result: only "homebrew launched" footprint, ban risk orders of magnitude lower than EmuMMC.
hbmenu.nro + License.txt on the SD root (see setup guide)Wipe the SD and boot back into SysMMC. Removing the EmuMMC partition reduces traces, but past online traffic is logged on Nintendo's side. To be safe, cool down offline for 1-2 weeks before trying our loader.
Ready to play safely on SysMMC?
Browse products →