Hello, former Citra developer here. I want to publicly report today that Lemonade, an "open source 3DS emulator" is STEALING MY CODE! Not only that, but when I reached the developers, they started refering to me in a very disrespectful way. 🧵(1/6)
Citra was licensed with the GPL license. This, among other things, forces anyone using the licensed code to keep it open source and credit the authors. However Lemonade developers were not complying with it. (2/6)
Using the benefit of the doubt, I created an issue in their Github repository explaining the GPL issue, you can find it here: (3/6) github.com/Lemonade-emu/L…
However, not long after that, more commits without proper crediting started appearing in their repo. This time not only mine, but from gpucode/emufan4568, another former Citra developer. (4/6)
Not only that, but they have started refering to me in their discord server using the name of a criminal. This is highly disrespectful. (5/6)
I want to remind everyone that me and gpucode are maintaining a fork of Citra, in an effort to ensure 3DS game preservation. Unlike Lemonade, we believe in respect and cooperation between devs, so please consider using our version instead: (6/6) github.com/PabloMK7/citra
@fire_ash_ Clarification: Issuing a DMCA request like some people are suggestion is going too far. The developers are being called out, and that's enough.
@_trapexit If a developer sees that credits are not being handled as "you would expect", then the developer will not contribute. This does no good for a project that claims to be the replacement of another dead project. ;)
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Here is ENLBufferPwn (CVE ID pending), a severe vulnerability in many first party 3DS, Wii U and Switch games. It allows remote code execution in a victim console by just having an online game session with an attacker.
Vulnerability report: github.com/PabloMK7/ENLBu…
🧵(1/7)
Combined with other OS exploits, this vulnerability could allow an attacker to achieve full console takeover, and steal sentitive information or take audio/video recordings. It has scored 9.8/10 (Critical) in the CVSS 3.1 calculator.
(2/7)
Nintendo has been releasing patches for affected games during 2022. A list of games that are known to have had the vulnerability at some point can be found in the vulnerability report.
(3/7)