Nintendo’s full case filing


https://twitter.com/stephentotilo/status/1762576284817768457/

"NEW: Nintendo is suing the creators of popular Switch emulator Yuzu, saying their tech illegally circumvents Nintendo’s software encryption and facilitates piracy. Seeks damages for alleged violations and a shutdown of the emulator.

Notes 1 million copies of Tears of the Kingdom downloaded prior to game’s release; says Yuzu’s Patreon support doubled during that time. Basically arguing that that is proof that Yuzu’s business model helps piracy flourish."

  • echo64@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    10 months ago

    (2) No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that— (A) is primarily designed or produced for the purpose of circumventing a technological measure that effectively controls access to a work protected under this title; (B) has only limited commercially significant purpose or use other than to circumvent a technological measure that effectively controls access to a work protected under this title; or © is marketed by that person or another acting in concert with that person with that person’s knowledge for use in circumventing a technological measure that effectively controls access to a work protected under this title. (3) As used in this subsection— (A) to “circumvent a technological measure” means to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner; and (B) a technological measure “effectively controls access to a work” if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work.

    • hperrin@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      10 months ago

      Yes, so distributing the code necessary to perform the decryption is illegal. That’s why you have to hack an actual switch to get the code necessary to perform the decryption (prod.keys). All Yuzu is doing is running that code through an AES library to get the game and emulating a Switch to play it. You can’t make AES libraries illegal just because they can be used to decrypt copy protection.

      It’s the same with DVD decryption. VLC is not illegal because it doesn’t include the codes used to decrypt DVDs. Once you have those codes, VLC can copy a DVD for you.

      • echo64@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        10 months ago

        No, it’s broader than that. Providing a mechanism is enough. Yes, this is functionally making maths illegal, and yes, this is a complaint we’ve had with the dmca for 20 years.

        Providing the keys is against dmca, as is Providing the tooling that specifically breaks the rights management. This is just the shitty way Americans made the copyright system.

            • hperrin@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              10 months ago

              I don’t know if the two cases are equivalent, DeCSS included all code necessary to decrypt a copy protected DVD.

              Yuzu does not include the necessary code to decrypt a Switch game. Users have to either “hack” their own Switch, or pirate the codes. What the users are doing is the illegal part here.

              • echo64@lemmy.world
                link
                fedilink
                English
                arrow-up
                1
                ·
                10 months ago

                You’re conflating the idea of code and keys. The keys are explicitly illegal as they directly fall under nintendo copyright.

                The code is also falling under breach of dmca, as its entire use and focus is to break drm. This is the sticking point here.

                Again, to labor the point, it’s nothing about the keys, we don’t need to talk about the keys.

                • hperrin@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  10 months ago

                  I’m using code in the sense of the word pass codes. Like, encryption codes. The codes you input to an encryption algorithm, along with the cyphertext, to get the plaintext.

                  But yes, Nintendo and you are saying that distributing Yuzu is illegal because it can only be used to violate the DMCA.

                  I disagree.

                  It can also be used in compliance with the DMCA, and nothing it includes are the intellectual property of Nintendo. There are exceptions to the rule about circumventing copy protection, and as long as you use Yuzu with an intent (such as security research) that falls in one of these exceptions, you can use Yuzu legally.

                  As long as Yuzu is never distributed by its authors with the encryption codes, it shouldn’t be illegal, even according to the DMCA. Otherwise, there would be no way to circumvent copy protection for legal purposes with regard to Switch games.

                  • echo64@lemmy.world
                    link
                    fedilink
                    English
                    arrow-up
                    1
                    ·
                    10 months ago

                    You can disagree if you like, nintendos lawyers, prior art, and everyone who understands the dmca isn’t going to agree with your stance at all.

                    Your stance is a moral one. The dmca is not moral. It exists to limit your freedoms in favor of companies’ profits. Enjoy your blinkered outlook.

                    Also, never use the word code like that, it’s incorrect and everyone will misunderstand you. It’s wrong. Use encryption key.