Up to now, almost all homebrew for the Switch have been developed with the concept in mind that everyone has access to RCM. As such, most homebrew and especially RCM payloads have zero protection for users on IPATCHED units.Understand that this means it is incredibly easy to do something which, while considered normal on consoles with an exploitable RCM, can render IPATCHED Switches permanently inoperable. For your safety, you should avoid using the following homebrews on IPATCHED systems:memloaderChoiDujourChoiDujourNX (safe on emuMMC, do not use on sysnand)Anything involving AutoRCM (briccmii, SX OS payload, etc)Many homebrews have been updated to block enabling AutoRCM on IPATCHED units including Hekate and ChoiDujourNX. Still exercise very high caution.Anything which writes to sysNAND without proper security or verification in placeUpon using PegaScape to reboot into a payload on an IPATCHED Switch, you should immediately create a NAND backup with Hekate and dump all of your keys (especially BIS keys) with Lockpick_RCM. Understand that by not dumping these, there is no recovery method for your Switch should anything cause it to fail to boot.You should strongly consider using an emuMMC for all CFW usage to avoid any damage to your Switch.That said, celebrate! We can now run CFW on IPATCHED Switches!