this post was submitted on 28 May 2024
40 points (91.7% liked)

PCGaming

6504 readers
1 users here now

Rule 0: Be civil

Rule #1: No spam, porn, or facilitating piracy

Rule #2: No advertisements

Rule #3: No memes, PCMR language, or low-effort posts/comments

Rule #4: No tech support or game help questions

Rule #5: No questions about building/buying computers, hardware, peripherals, furniture, etc.

Rule #6: No game suggestions, friend requests, surveys, or begging.

Rule #7: No Let's Plays, streams, highlight reels/montages, random videos or shorts

Rule #8: No off-topic posts/comments

Rule #9: Use the original source, no editorialized titles, no duplicates

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 1 points 5 months ago (11 children)

In before inevitable DMCA!

(I haven't been following but nice to see a group release one of these instead of announcing it months before it's done and getting Nintendo'd before any chance to release it into the wild.)

[–] [email protected] 17 points 5 months ago (5 children)

They are not publishing any copyright protected content. Users need to provide their own ROM in order to use it with Nintendo's assets, presumably sourced legally. The project itself does not provide any of these assets.

[–] [email protected] 3 points 5 months ago (3 children)

How is that different from the emulators that Nintendo has shut down?

Nintendo alleged Yuzu was “primarily designed to circumvent several layers of Nintendo Switch encryption so its users can play copyrighted Nintendo games", that's all it took, and isn't that exactly what this is doing? It just happens to be one single game, rather than a large number of them.

[–] [email protected] 7 points 5 months ago

i would direct the questions to harbor masters, as i'm not sure whether their software uses the same methods to decrypt ROMs as yuzu does. my understanding is that yuzu was targeted specifically because they were using nintendo's proprietary decrypting keys at runtime

load more comments (2 replies)
load more comments (3 replies)
load more comments (8 replies)