this post was submitted on 27 Feb 2024
719 points (98.0% liked)

Games

32475 readers
1517 users here now

Welcome to the largest gaming community on Lemmy! Discussion for all kinds of games. Video games, tabletop games, card games etc.

Weekly Threads:

What Are You Playing?

The Weekly Discussion Topic

Rules:

  1. Submissions have to be related to games

  2. No bigotry or harassment, be civil

  3. No excessive self-promotion

  4. Stay on-topic; no memes, funny videos, giveaways, reposts, or low-effort posts

  5. Mark Spoilers and NSFW

  6. No linking to piracy

More information about the community rules can be found here.

founded 1 year ago
MODERATORS
 

Nintendo's full case filing


https://twitter.com/stephentotilo/status/1762576284817768457/

"NEW: Nintendo is suing the creators of popular Switch emulator Yuzu, saying their tech illegally circumvents Nintendo's software encryption and facilitates piracy. Seeks damages for alleged violations and a shutdown of the emulator.

Notes 1 million copies of Tears of the Kingdom downloaded prior to game's release; says Yuzu's Patreon support doubled during that time. Basically arguing that that is proof that Yuzu's business model helps piracy flourish."

you are viewing a single comment's thread
view the rest of the comments
[–] Atemu@lemmy.ml 2 points 8 months ago (1 children)

Yuzu doesn’t include any form of tooling that breaks encryption

You cannot state that with certainty. That's the problem.

Yuzu does indeed include a method to use the Switch's production keys (which you must dump yourself) to decrypt the games. Whether this constitutes effective DRM is not a question that can easily be answered and must be decided by a court on a case-by-case basis.
This will be what the case will hinge on: Is Ninty's scheme effective DRM?

I would say no because symmetric encryption with a publicly known key may aswell be no encryption at all but that's not my decision to make.

They aren’t facilitating it, the user has to provide all of that chain of the emulation on their own.

Um, no. The emulator is doing the decryption on its own. All the user does is provide the prod keys and unmodified ROM.

[–] dustyData@lemmy.world 1 points 8 months ago* (last edited 8 months ago) (1 children)

Yuzu itself doesn't provide tools to dump keys and Roms from the Switch. The user has to procure them, or the means to dump them, themselves. Thus Yuzu doesn't facilitates DRM circumvention. The user has to solve that part on their own. They do provide guides for how to do it on their website. But Yuzu themselves don't make or distribute the tooling, and Yuzu the software is incapable of doing it.

[–] Atemu@lemmy.ml 1 points 8 months ago* (last edited 8 months ago) (1 children)

The dumps are just that: Dumps; 1:1 copies.

The tools don't decrypt anything; that happens within Yuzu. Why else would users need to provide the prod keys to Yuzu?

[–] dustyData@lemmy.world 1 points 8 months ago

To dump the keys, third party tools rely on DRM circumventing sploits. You essentially have to hack your own device, certain versions of Switch and certain software updates are no longer susceptible. But it remains that Yuzu doesn't do any of that. Those tools and sploits were developed by others.