Nintendo sued Yuzu developers claiming they provide accurate information to extract keys

nintendo vs yuzu

nintendo vs yuzu

A few days ago the news was announced that Nintendo filed a lawsuit against el team behind the Yuzu open source project, which focuses on the development of an emulator for the popular game console "Nintendo Switch." The demand alleges that the Yuzu emulator is being used to play pirated games, which infringes Nintendo's copyright and violates its terms of use.

To protect against piracy and unauthorized play of games, Nintendo uses cryptographic keys to encrypt firmware content and game files on your consoles. These keys are essential to unlock and play the games on an official Nintendo Switch console. Nintendo claims that the use of the Yuzu emulator involves illegal circumvention of these technical protection measures.

The emulator Yuzu requires users to obtain game decryption keys to run the games on the emulator. Although obtaining these keys It is usually done using third-party tools and is the responsibility of the user, Nintendo considers that the act of decrypting games on the emulator constitutes a violation of its terms of use and an illegal circumvention of copyright protection measures.

Even if a user uses keys taken from their own purchased copy of the game, this violates Nintendo's terms of use, which prohibit playing games on unauthorized platforms. This is why Nintendo is seeking compensation for misuse of the Yuzu emulator and seeking a court order to stop its development, promotion and distribution.

Nintendo too argues that emulator distribution Yuzu creates an environment conducive to the spread of pirated copies of its games. This is because the emulator not only allows you to play games on the console, but also on conventional computers. From Nintendo's perspective, Yuzu is perceived as a tool that turns ordinary computers into means for massive infringement of the company's intellectual property and copyrighted products.

The lawsuit highlights that one of the Yuzu developers made public statements indicating that most of the emulator users use hacked keys. Additionally, the Yuzu website contains instructions for extracting keys (prod.keys) of the consoless and links to tools to obtain keys and copy unauthorized games for execution on other devices. The Yuzu user manual also references the need for system files copied from a jailbroken Nintendo Switch for games to run properly.

Based on these examples, Nintendo maintains that the Yuzu developers were aware from the beginning that its software was being used to evade security measures and that its actions could be considered as facilitating piracy. Furthermore, Nintendo is prepared to prove that Yuzu developers violated the DMCA law by obtaining keys from a hacked console while working on the emulator and by copying games to run on the emulator.

Besides that, as an example of loss of income because of Yuzu, the game "The Legend of Zelda: Tears of the Kingdom" is mentioned, whose pirated copy was available a week and a half before its official launch for Nintendo Switch and was downloaded more than a million times. 20% of links to pirated downloads of this game explicitly mention running on an emulator and it is argued that the Yuzu developers benefited from the appearance of pirated copies, as evidenced by the increase in the number of members who supported Yuzu on Patreon at the time the pirated copy appeared. Patreon members have the opportunity to access early versions of new versions of Yuzu.

finally if you are interested in knowing more In this regard, you can consult the details in the following link.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.