The real deal y0

  • 0 Posts
  • 92 Comments
Joined 2 years ago
cake
Cake day: July 16th, 2023

help-circle




  • The problem is they are using ubuntu 24.04 which runs on an older kernel by default. Im a mainline user so unsure which kernel ubuntu uses now but i think its 6.4 which lacks a lot of intel driver fixes and support for battlemage. I cant blame them for not knowing or specifying, the only person knowledgeable for this is wendel and his team (level1techs).
    Outside of mainline, ubuntu has a 6.14 kernel build they support but you have to actively look for it in the ui.
    It is however, a sign for me that ltt is not suited for this and should have waited and investigated more before posting. Or maybe asked external help to verify stuff idk







  • A yes, the fun times of a baby haha. Enjoy! :p
    Anyway, Secure boot itself was designed by the eufi consortium, which is a group of pc tech companies, to help make sure devices only boot what it can trust. Good on paper and in practice but…

    back in circa 2011 microsoft had enforced any pc that wanted to be windows 8 certified ( and get the sticker ) to require secure boot to be enabled together with fastboot. All motherboards needed to have a tpm module with only the microsoft certificate in it. This meant that booting from a usb or cd was completely off the table and you could just not install linux, period.
    And even if you did, the kernels or bootloaders were not signed so they would be refused by the bios/eufi.

    This was a big thing back then, and canonical and redhat tried and found a few ways around it, and so did some individuals.

    But afaik the linux foundation ( which microsoft is part of, funnily enough ) made some binaries that were signed and allowed linux to boot under secure boot, including usb/cd.
    Iirc, during the linux installation the distro will add its certificate to the tpm so that kernels signed by the distro boot fine.

    To this day, without those binaries from the foundation, it would be impossible to boot linux with secure boot and can still cause issues when dual booting and having bitlocker enabled for example. Bitlocker detects a changed boot state (by grub) and says fuck that, give me the recovery key or i aint decrypting this.

    Here is a google search if you want dig deeper, it should all be from circa 2011-2012 :
    https://www.google.com/?q=windows+8+oem+to+disable+linux





  • Thats bullshit. The switch 1 also had all of this functionality and nobody complained…
    Physical media ftw btw

    First lookup what youre saying, seriously. None of what you said is true. If it was, a system that had no internet could not start any downloaded content, which it can…
    Backwards comparability obviously might not work because it needs the title update to get possible fixes if not big part of the gpu shaders that were recompiled for switch 2 ( which is needed because the switch 1 and switch 2 gpu’s are not compatible ). Iirc from my sources within the switch homebrew community it tries to trans compile them but might not always work, hence title updates.

    And if you got the console banned, you did some serious bad shit haha




  • What is defined as copy here? Cartridge data (game data, not firmware etc) is encrypted and can only be accessed by a protocol that is like spi, but is proprietary, by a specific chip running nintendo code. Or is a copy a full backup of everything on the chip?
    Is the copy a raw copy? Has the data been modified/decrypted/or any algorithm processed it?
    These things define wether a copy falls under this or not. Check what the fineprint or laws defines what ’ a copy’ is exactly in this case.
    If it doesnt, what i mentioned are important to see if what you said apply here or not.

    Like @[email protected] said, its only legal if nothing is done with the data. Any decryption using a nintendo key is infact, illegal, and falls under piracy.

    This is why dolphin was removed from steam, because they do exactly that. Decrypt the data to use it.

    If the process of dumping does any encryption or decryption, you also get in trouble in what they said.

    These are the laws, and the lawyer you asked this too must not have been specialised in ip law, copyright and games, or doesnt know the technical details to decide on this.

    The mig chip uses a proprietary protocol to send data of a partly, semi decrypted, game image. That will not go well in court, no matter if the rom was obtained legally.