Most active commenters
  • jsheard(5)

←back to thread

288 points ashitlerferad | 30 comments | | HN request time: 1.101s | source | bottom
1. bladderlover21 ◴[] No.42063777[source]
And this reveals the real reason Nintendo came after Switch emulators - to buy some extra time before Switch 2 gets properly emulated.
replies(4): >>42064022 #>>42064617 #>>42065596 #>>42069690 #
2. jsheard ◴[] No.42064022[source]
The hard part of emulating the Switch 2 probably isn't going to be the actual emulation, but breaking the security so that the games and firmware can be extracted and decrypted. Nintendo pretty much nailed their software security with the Switch 1 but were undone by catastrophic hardware bugs, so we'll have to see how well they learned their lesson on the hardware front next time.

Microsoft and Sony have demonstrated that hardware security can be more or less perfected, neither of their systems have been compromised via hardware attacks for several generations now.

replies(4): >>42064215 #>>42064979 #>>42070856 #>>42071812 #
3. farseer ◴[] No.42064215[source]
Microsoft and Sony have successfully prevented their systems from being jtaged or mod-chipped. Not sure you can prevent dumping the actual game binary on the internet. That has lots of software and hardware attack vectors and only needs to be done once by a professional enthusiast.
replies(2): >>42064306 #>>42065252 #
4. jsheard ◴[] No.42064306{3}[source]
The game binaries are encrypted, sure you can image the Blurays and put them online but they won't do anyone much good without access to the keys buried in the firmware, which are also a moving target since they can be rotated via mandatory firmware updates if they get compromised. In the case of the Switch, you also have to contend with the proprietary carts requiring a crypto handshake before they'll let you even read the encrypted game data.
replies(1): >>42065040 #
5. cholantesh ◴[] No.42064687[source]
If only anyone been able to establish this as a credible defense in court.
replies(1): >>42064756 #
6. moralestapia ◴[] No.42064756{3}[source]
"This is my IP" is an absolutely valid defense in court. There have been tens of thousands of trials with IP infringement at its core.

https://en.wikipedia.org/wiki/List_of_copyright_case_law

https://en.wikipedia.org/wiki/List_of_patent_case_law

https://en.wikipedia.org/wiki/List_of_trademark_case_law

https://en.wikipedia.org/wiki/List_of_United_States_patent_l...

https://en.wikipedia.org/wiki/List_of_United_States_Supreme_...

https://en.wikipedia.org/wiki/List_of_United_States_Supreme_...

https://en.wikipedia.org/wiki/List_of_United_States_Supreme_...

Did you not know this?

replies(3): >>42064870 #>>42064871 #>>42064925 #
7. cholantesh ◴[] No.42064870{4}[source]
Are you aware of a case where the practice of emulation has ever been found, in court, to be a case of IP infringement? Because that's actually the pertinent claim here, not that IP infringement is a real thing that exists.
replies(1): >>42065024 #
8. ◴[] No.42064871{4}[source]
9. JoshTriplett ◴[] No.42064917[source]
Emulation is legal, per established case law. Sony v Bleem, Sony v Connectix, Sega v Accolade.

There are legal issues around how to legally obtain emulatable copies of the games you own, but emulation is absolutely legal.

(This is not a commentary on whether the emulators in question were careful in every other way.)

replies(1): >>42065088 #
10. LelouBil ◴[] No.42064925{4}[source]
I think they meant about emulation.

I believe emulation is legal in the US.

11. kregasaurusrex ◴[] No.42064979[source]
The main hardware security bugs[0] were very low hanging fruit associated with taking over the boot chain at ring 0- it's more likely that Nintendo themselves were in a rush to get the product on the market after the perceived failure of the Wii U. Even with a secure software stack, people found a way to defeat the Xbox 360 hardware[1] by physically drilling into a chip that enforced a software lock, and George Hotz became known for his work in finding ECDSA flaws in the PS3. Companies can design these locks to last for a few years of a console's lifespan, but I think people now are determined enough to dive into these difficult problems that they're unlikely to be secured forever.

[0] https://www.gamesindustry.biz/unpatchable-hardware-exploit-l...

[1] https://gbatemp.net/threads/scanned-drilling-template-16d4s-...

replies(3): >>42065217 #>>42065276 #>>42068561 #
12. gcr ◴[] No.42065040{4}[source]
What on earth do you mean? How does a physical blu-ray’s encryption keys get rotated?

Do you mean that the protection on the firmware gets refreshed with updates, but the secret it protects always stays the same?

replies(1): >>42065092 #
13. moralestapia ◴[] No.42065088{3}[source]
I know some instances of emulation have been resolved to be fair use.

Still, Nintendo's motive is to defend their IP.

Even if the lawsuits go nowhere, it still works for them.

See, https://www.pcgamer.com/gaming-industry/switch-emulator-ryuj....

If Nintendo's IP wasn't involved they wouldn't give a rat ass about the emulation scene.

replies(1): >>42065597 #
14. jsheard ◴[] No.42065092{5}[source]
I mean the keys can be rotated for future game releases, so extracting the keys from firmware X doesn't allow you to decrypt all new physical games in perpetuity, because past a certain point they'll start using a key that only exists in firmware Y onwards. Key rotation was moot in the case of the Switch 1 since the early models were so thoroughly broken that Nintendo couldn't do anything to stop the new keys from being extracted every time, but it worked for Sony and Microsoft whose systems generally only get one-off software exploits that can be closed forever via firmware updates.
15. jsheard ◴[] No.42065217{3}[source]
There's a reason why you have to go back to the 360 and PS3 for those examples, Sony and Microsoft stepped up their hardware security dramatically after that generation. Neither the PS4, PS5, Xbox One or Xbox Series systems have ever been compromised via hardware attacks, and those earlier ones are over a decade old now.

The Xboxes have held up extremely well on the software front as well, and although the Playstation software isn't so robust (they use FreeBSD and routinely get owned by upstream CVEs) their secure boot has never been broken, which limits how much you can do with a software jailbreak. PS3 jailbreaks had continuity where you could upgrade an exploitable firmware to a non-exploitable one while retaining a backdoor, but the PS4s secure boot put an end to that.

replies(3): >>42067727 #>>42067760 #>>42068847 #
16. downrightmike ◴[] No.42065252{3}[source]
MSFT largely did this by building the xbox platform basically on a local hyper-v system that they can control and not have to worry about hardware.
17. blharr ◴[] No.42065276{3}[source]
I mean, it is a classic example. If you have access to the hardware and the dedication to do so, you could break almost any security. That's a hilarious example to physically drill into a chip, though
replies(1): >>42065880 #
18. ashconnor ◴[] No.42065596[source]
Mig Switch should work then.
19. JoshTriplett ◴[] No.42065597{4}[source]
They worked for Sony, too, by driving emulators out of business. But that doesn't make it illegal; it just means the infliction of massive legal defense costs are an effective tactic.
20. audunw ◴[] No.42065880{4}[source]
This could be “famous last words”, but as someone who has worked with chip security I’d be very surprised if anyone breaks this generation of hardware at the chip level.

A decade ago the engineers designing these chips knew there were several angles of attack but there just wasn’t enough resources put into closing these holes.

Now every know angle of attack is closed. Even if you delid the chip and reverse engineer every single gate and can probe individual metal wires on the chip, it’ll still be nearly impossible to break the hardware security. Power supply and EM glitching is also protected against (can’t speak for Switch 2 but I’m speaking in general about chips going forward)

Could be bugs and mistakes that allows someone to bypass security, of course. Both in hardware and software. But I don’t think there will be general purpose angles of attack that can be used to bypass security going forward.

replies(2): >>42065978 #>>42071030 #
21. jsheard ◴[] No.42065978{5}[source]
> Power supply and EM glitching is also protected against (can’t speak for Switch 2 but I’m speaking in general about chips going forward)

Microsoft talked openly about implementing those safeguards in the Xbox One, and they've held up for a decade or so now.

https://www.youtube.com/watch?v=U7VwtOrwceo

22. pjmlp ◴[] No.42067727{4}[source]
Also a note that the XBox security CPU, Pluton is a requirement for more recent PC hardware architecture designs.

And for Rust fans, its firmware has been rewriten.

23. ◴[] No.42067760{4}[source]
24. Lammy ◴[] No.42068561{3}[source]
> it's more likely that Nintendo themselves were in a rush to get the product on the market after the perceived failure of the Wii U

Perceived failure of the Wii U and the total reboot of the Switch project itself: https://mynintendonews.com/2020/12/22/nintendo-leak-shows-sw...

25. realusername ◴[] No.42068847{4}[source]
That's not the only reason, Microsoft and Sony did improve their security a lot but their console are also much less juicy targets than in the past as well. The Xbox and the Playstation have way less exclusive games than in the past and the difference with the PC is much smaller nowadays
26. hbn ◴[] No.42069690[source]
There's also the fact that their games keep leaking a week or 2 head of release, so people can play them earlier and with better performance by downloading the leaked game and playing on an emulator.

I think Nintendo has a case to make that Switch emulation is costing them real money.

replies(1): >>42072856 #
27. akira2501 ◴[] No.42070856[source]
> can be more or less perfected

When it comes to video games. That's not much of a demonstration in the grand scheme of things.

28. ls612 ◴[] No.42071030{5}[source]
I think it is less that such a thing isn't possible and more that it isn't possible on "guy alone in his basement" resource and expertise constraints. And because of awful laws like DMCA 1201 if you get beyond that, or if your work becomes widely known, you will become Nintendo's new lifetime indentured servant courtesy of Uncle Sam.
29. Gigachad ◴[] No.42071812[source]
The modern versions of the switch with those catastrophic bugs patched are still hackable though through mod chips. It's too hard for the casual user to install, but it's plenty accessible for a hacker who just wants to dump ROMs and reverse engineer the OS.

Even if the software is absolutely bulletproof, you can hack almost everything by modifying the hardware. Cutting the power of the CPU for a tiny amount of time for example can cause it to glitch in a way that bypasses the security checks. This is accessible enough for at least one person to get in and dump games.

30. ronsor ◴[] No.42072856[source]
Sounds like Nintendo's problem. They should step up their security to prevent leaks.

As for people choosing an emulator over buying a Switch: too bad, that's how competition works.