1 00:00:01,100 --> 00:00:04,340 covering the week's top textbooks like 2 00:00:04,340 --> 00:00:04,350 covering the week's top textbooks like 3 00:00:04,350 --> 00:00:07,400 covering the week's top textbooks like Linux bias an anonymous hacker leaked 4 00:00:07,400 --> 00:00:07,410 Linux bias an anonymous hacker leaked 5 00:00:07,410 --> 00:00:09,560 Linux bias an anonymous hacker leaked around 2 terabytes worth of source code 6 00:00:09,560 --> 00:00:09,570 around 2 terabytes worth of source code 7 00:00:09,570 --> 00:00:12,080 around 2 terabytes worth of source code related to the Nintendo Wii GameCube and 8 00:00:12,080 --> 00:00:12,090 related to the Nintendo Wii GameCube and 9 00:00:12,090 --> 00:00:15,410 related to the Nintendo Wii GameCube and intend oh 64 designs this cache includes 10 00:00:15,410 --> 00:00:15,420 intend oh 64 designs this cache includes 11 00:00:15,420 --> 00:00:16,849 intend oh 64 designs this cache includes very log code for the hardware 12 00:00:16,849 --> 00:00:16,859 very log code for the hardware 13 00:00:16,859 --> 00:00:18,830 very log code for the hardware essentially the coded blueprints for the 14 00:00:18,830 --> 00:00:18,840 essentially the coded blueprints for the 15 00:00:18,840 --> 00:00:21,650 essentially the coded blueprints for the various chips while a neat peek into the 16 00:00:21,650 --> 00:00:21,660 various chips while a neat peek into the 17 00:00:21,660 --> 00:00:23,570 various chips while a neat peek into the inner workings of Nintendo and a rare 18 00:00:23,570 --> 00:00:23,580 inner workings of Nintendo and a rare 19 00:00:23,580 --> 00:00:25,130 inner workings of Nintendo and a rare look at the low-level design of the 20 00:00:25,130 --> 00:00:25,140 look at the low-level design of the 21 00:00:25,140 --> 00:00:27,140 look at the low-level design of the specialized chips that go into consoles 22 00:00:27,140 --> 00:00:27,150 specialized chips that go into consoles 23 00:00:27,150 --> 00:00:29,300 specialized chips that go into consoles don't expect too much to come out of 24 00:00:29,300 --> 00:00:29,310 don't expect too much to come out of 25 00:00:29,310 --> 00:00:31,880 don't expect too much to come out of this while in theory the very log code 26 00:00:31,880 --> 00:00:31,890 this while in theory the very log code 27 00:00:31,890 --> 00:00:33,470 this while in theory the very log code could be used to turn chlochops 28 00:00:33,470 --> 00:00:33,480 could be used to turn chlochops 29 00:00:33,480 --> 00:00:35,540 could be used to turn chlochops into Nintendo chip knock-offs the 30 00:00:35,540 --> 00:00:35,550 into Nintendo chip knock-offs the 31 00:00:35,550 --> 00:00:37,490 into Nintendo chip knock-offs the equipment and expertise needed to do 32 00:00:37,490 --> 00:00:37,500 equipment and expertise needed to do 33 00:00:37,500 --> 00:00:39,860 equipment and expertise needed to do that would be very expensive and not the 34 00:00:39,860 --> 00:00:39,870 that would be very expensive and not the 35 00:00:39,870 --> 00:00:41,630 that would be very expensive and not the sort of thing a hobbyist could do and 36 00:00:41,630 --> 00:00:41,640 sort of thing a hobbyist could do and 37 00:00:41,640 --> 00:00:44,060 sort of thing a hobbyist could do and any commercial efforts would no doubt be 38 00:00:44,060 --> 00:00:44,070 any commercial efforts would no doubt be 39 00:00:44,070 --> 00:00:48,229 any commercial efforts would no doubt be torn to shreds by Nintendo lawyers the 40 00:00:48,229 --> 00:00:48,239 torn to shreds by Nintendo lawyers the 41 00:00:48,239 --> 00:00:50,389 torn to shreds by Nintendo lawyers the leak also apparently won't be of any use 42 00:00:50,389 --> 00:00:50,399 leak also apparently won't be of any use 43 00:00:50,399 --> 00:00:52,610 leak also apparently won't be of any use to the developers of emulators who can 44 00:00:52,610 --> 00:00:52,620 to the developers of emulators who can 45 00:00:52,620 --> 00:00:54,709 to the developers of emulators who can only legally do what they do by reverse 46 00:00:54,709 --> 00:00:54,719 only legally do what they do by reverse 47 00:00:54,719 --> 00:00:57,290 only legally do what they do by reverse engineering the developers of the 48 00:00:57,290 --> 00:00:57,300 engineering the developers of the 49 00:00:57,300 --> 00:00:59,150 engineering the developers of the dolphin emulators say in response to the 50 00:00:59,150 --> 00:00:59,160 dolphin emulators say in response to the 51 00:00:59,160 --> 00:01:01,760 dolphin emulators say in response to the leak we cannot use anything of any sort 52 00:01:01,760 --> 00:01:01,770 leak we cannot use anything of any sort 53 00:01:01,770 --> 00:01:04,100 leak we cannot use anything of any sort from a leak in fact we can't even look 54 00:01:04,100 --> 00:01:04,110 from a leak in fact we can't even look 55 00:01:04,110 --> 00:01:04,490 from a leak in fact we can't even look at it 56 00:01:04,490 --> 00:01:04,500 at it 57 00:01:04,500 --> 00:01:06,859 at it dolphin is only legal because we are 58 00:01:06,859 --> 00:01:06,869 dolphin is only legal because we are 59 00:01:06,869 --> 00:01:08,990 dolphin is only legal because we are cleanroom reverse engineering the 60 00:01:08,990 --> 00:01:09,000 cleanroom reverse engineering the 61 00:01:09,000 --> 00:01:11,840 cleanroom reverse engineering the GameCube and Wii if we use anything from 62 00:01:11,840 --> 00:01:11,850 GameCube and Wii if we use anything from 63 00:01:11,850 --> 00:01:12,289 GameCube and Wii if we use anything from a leak 64 00:01:12,289 --> 00:01:12,299 a leak 65 00:01:12,299 --> 00:01:14,750 a leak dolphin is no longer legal and Nintendo 66 00:01:14,750 --> 00:01:14,760 dolphin is no longer legal and Nintendo 67 00:01:14,760 --> 00:01:17,450 dolphin is no longer legal and Nintendo will shut us down that's not to say 68 00:01:17,450 --> 00:01:17,460 will shut us down that's not to say 69 00:01:17,460 --> 00:01:19,219 will shut us down that's not to say there won't be a fly-by-night emulators 70 00:01:19,219 --> 00:01:19,229 there won't be a fly-by-night emulators 71 00:01:19,229 --> 00:01:22,039 there won't be a fly-by-night emulators which include the lead code but we'd 72 00:01:22,039 --> 00:01:22,049 which include the lead code but we'd 73 00:01:22,049 --> 00:01:24,080 which include the lead code but we'd advise serious caution when considering 74 00:01:24,080 --> 00:01:24,090 advise serious caution when considering 75 00:01:24,090 --> 00:01:27,080 advise serious caution when considering and using any such tool as it is very 76 00:01:27,080 --> 00:01:27,090 and using any such tool as it is very 77 00:01:27,090 --> 00:01:29,390 and using any such tool as it is very likely to include malware or backdoors 78 00:01:29,390 --> 00:01:29,400 likely to include malware or backdoors 79 00:01:29,400 --> 00:01:32,840 likely to include malware or backdoors or malicious use