{"id":24933,"date":"2023-07-31T23:36:54","date_gmt":"2023-07-31T21:36:54","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=24933"},"modified":"2023-08-06T21:35:41","modified_gmt":"2023-08-06T19:35:41","slug":"the-nintendo-gigaleak-incident","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/07\/31\/the-nintendo-gigaleak-incident\/","title":{"rendered":"The Nintendo &#8216;Gigaleak&#8217; Incident"},"content":{"rendered":"\n<p>It is not a secret that many big corporations and companies conceal sensitive data and projects from the public. In concern to video game companies, many of these internal game-related projects would never see the light of day even though there had already been a lot of money and time put into them. When these projects are ultimately canceled, it would be due to insufficient interest, development or technological issues or lack of required personnel caused by other demanding projects with a higher priority. In front of the public, the company-issued statements in regard to project cancellations are carefully crafted to discourage public dissent or its existence is entirely denied from the start.<\/p>\n\n\n\n<p>However, 2020 would become a troublesome year for Nintendo as they had to deal with, what many news reporters would believe to be, the biggest data leaks in the history of video gaming. Information about long forgotten projects, delicate specifications of hardware prototypes and development agendas within game prototype builds would surface. As the event would be dubbed the Nintendo \u201eGigaleak\u201c, this blog article will delve into the circumstances surrounding the leaks and the consequences not only for Nintendo but also for the gaming industry.<\/p>\n\n\n<div class=\"wp-block-aioseo-table-of-contents\"><ul><li><a class=\"aioseo-toc-item\" href=\"#aioseo-background\">Background<\/a><\/li><li><a class=\"aioseo-toc-item\" href=\"#aioseo-the-gigaleak\">The Gigaleaks<\/a><ul><li><a class=\"aioseo-toc-item\" href=\"#aioseo-first-leak-march-2018\">First Leak: March 2018<\/a><\/li><li><a class=\"aioseo-toc-item\" href=\"#aioseo-second-leak-july-2020\">Second Leak: July 2020<\/a><\/li><li><a class=\"aioseo-toc-item\" href=\"#aioseo-third-fifth-leak-september-2020\">Third-Fifth Leak: September 2020<\/a><\/li><li><a class=\"aioseo-toc-item\" href=\"#aioseo-third-fifth-leak-september-2020\">Sixth-Eighth Leak: October 2020<\/a><\/li><li><a class=\"aioseo-toc-item\" href=\"#aioseo-ninth-leak-december-2020\">Ninth Leak: December 2020<\/a><\/li><li><a class=\"aioseo-toc-item\" href=\"#aioseo-tenth-leak\">Tenth Leak: July 2021<\/a><\/li><\/ul><\/li><li><a class=\"aioseo-toc-item\" href=\"#aioseo-the-perpetrators\">The Perpetrators<\/a><ul><li><a class=\"aioseo-toc-item\" href=\"#aioseo-the-breach\">The Breach<\/a><\/li><\/ul><\/li><li><a class=\"aioseo-toc-item\" href=\"#aioseo-nintendos-response\">Nintendo&#039;s Response in concern to security<\/a><\/li><li><a class=\"aioseo-toc-item\" href=\"#aioseo-closure\">Closure<\/a><\/li><li><a class=\"aioseo-toc-item\" href=\"#aioseo-wq\">Sources<\/a><ul><li><a class=\"aioseo-toc-item\" href=\"#aioseo-references\">References<\/a><\/li><li><a class=\"aioseo-toc-item\" href=\"#aioseo-image-sources\">Image Sources<\/a><\/li><\/ul><\/li><\/ul><\/div>\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\" id=\"aioseo-background\">Background<\/h2>\n\n\n\n<p>Nintendo is a Japanese video game company that is engaged in developing and publishing video games and video game consoles. With an annual revenue of more than 11 billion dollars, Nintendo stands as a powerhouse in the video game landscape with influence and prestige sounding within the global market <sup>[1]<\/sup>. As with other similarly large industrial giants, Nintendo also has to deal with malicious attacks that are targeted towards phishing user account data, finding exploits in their security infrastructure and also within their games and consoles. Needless to say, a potential security leak could lead to serious issues which could undermine Nintendo\u2019s ability to secure and protect valuable user data, both from a legal and moral perspective.<\/p>\n\n\n\n<p>Even prior to the actual leaks which started in July 2020, Nintendo was already dealt a bad card in terms of cybersecurity incidents. In March 2020, Nintendo reported that up to 160.000 Nintendo Switch accounts were accessed by hackers and their Nintendo Network IDs were phished <sup>[2]<\/sup>. The manner on how the hackers could obtain access to the accounts is assumed to be either via credential stuffing attacks or by exploiting the legacy login system via NNID <sup>[3]<\/sup>. With sensitive user data including nicknames, birth dates and email-addresses leaked, Nintendo was urged to upgrade security measurements which later resulted in Nintendo requiring users to use two-factor authentication in order to prevent future unauthorized access <sup>[4]<\/sup>. The fact that the Gigaleak happened just months after this security incident could be attributed to bad luck on Nintendo\u2019s part.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"aioseo-the-gigaleak\">The Gigaleaks<\/h2>\n\n\n\n<p>To establish the base line of the blog article about the Gigaleak itself, it is important to mention that the leaks most likely started long before 2020, as a small set of leaks happened in 2018 which illegally publicized tech demo builds of Pokemon Gold and Silver from the Pokemon Space World Demo in 1997 <sup>[5]<\/sup>. Due to the comparable insignificance of the leak amount to the Gigaleak and it being an isolated incident, it was not evidently connected to the Gigaleak. Yet by the nature of how the later Gigaleaks would be distributed, a clear connection and reference to the 2018 leak could be established <sup>[6]<\/sup>. As the total file sizes of the leaks vary greatly, they are not always one gigabyte in size as some leaks are smaller than that. Despite this, as they likely all come from the same source, these individual incidences are still categorized as belonging to the Gigaleak events. More on the topic of the method of leak distribution and Behind the Scenes circumstances will be explained <a href=\"http:\/\/aioseo-the-perpetrators\" title=\"here\">here<\/a>.<\/p>\n\n\n\n<p>Now for the leaks themselves: the Gigaleak consisted of nine separate leak incidents which exposes different topics of illegally obtained information and data. Its contents ranges from old documentation and drafts of potential technological patents, to development-specific game project CVSs (Concurrent Versions System) and unreleased game builds. With the exception of the very first leak in March 2018, the actual dump of data happens between July and December of 2020. This blog article will first explore the individual leaks and immediate caused impact. Afterwards, it will describe the circumstances surrounding the supposed leaker and the manner with which the data was obtained. Lastly we will summarize the findings of the leaks and Nintendo&#8217;s response and actions in regard to strengthening its security.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"aioseo-first-leak-march-2018\">First Leak: March 2018<\/h3>\n\n\n\n<p>Back in March 2018, leaks surfaced on multiple platforms and they likely came from the same source. Leaks of a mysterious ROM containing the Space World 1997 prototype of Pokemon Gold and Silver (labelled \u201cSW97\u201d) were uploaded to PRET&#8217;s discord server <sup>[7]<\/sup>. PRET stands for \u201cPokemon Reverse Engineering Team\u201d and their github account shows feats of decompilations and disassemblies of various Pokemon game titles, including being able to fully reverse engineer Pokemon Red and Blue back into Z80 assembly code <sup>[8]<\/sup>.<\/p>\n\n\n\n<p>More presentable images such as records of old and scrapped Pokemon designs and a discontinued China-only console model called the iQue Player were leaked onto the image-based bulletin board 4chan<sup> [9]<\/sup>. Especially the Pokemon design leaks sparked huge discussions on the internet and gave valuable insight on earlier design prototypes and also about certain common criteria which ruled Pokemon designs out from being picked <sup>[10]<\/sup>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik.png\"><img loading=\"lazy\" decoding=\"async\" width=\"502\" height=\"105\" data-attachment-id=\"25200\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/07\/31\/the-nintendo-gigaleak-incident\/grafik-10\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik.png\" data-orig-size=\"502,105\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"grafik\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik.png\" alt=\"\" class=\"wp-image-25200\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik.png 502w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-300x63.png 300w\" sizes=\"auto, (max-width: 502px) 100vw, 502px\" \/><\/a><figcaption class=\"wp-element-caption\">Many prototype designs feel familiar and throughout development they will shift to slowly become the iconic Pokemon we know <sup>[I1]<\/sup>.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"920\" height=\"458\" data-attachment-id=\"25203\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/07\/31\/the-nintendo-gigaleak-incident\/grafik-1-4\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-1.png\" data-orig-size=\"920,458\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"grafik-1\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-1.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-1.png\" alt=\"\" class=\"wp-image-25203\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-1.png 920w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-1-300x149.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-1-768x382.png 768w\" sizes=\"auto, (max-width: 920px) 100vw, 920px\" \/><\/a><figcaption class=\"wp-element-caption\">Certain Pokemon such as Vulpix, Paras, Meowth, Doduo, Grimer and Mr. Mime were planned to have a pre-evolution <sup>[I2]<\/sup>.<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"aioseo-second-leak-july-2020\">Second Leak: July 2020<\/h3>\n\n\n\n<p>Around the 24<sup>th<\/sup> of July 2020, a series threads on 4chan titled \u201cGigaleak\u201d would publish several compressed files containing source codes of earlier Nintendo consoles such as the Super Nintendo Entertainment System (SNES) and the Nintendo 64 (N64). The leaks were numerous gigabytes in size and the term Gigaleak would primarily refer to the leak incidences on the image-based bulletin board 4chan. As the terminology is not adopted naturally, some people refer to the leak of SNES and N64 source codes as separate incidences while internet archivists would sum them up into one big leak<sup> [11] [12]<\/sup>.<\/p>\n\n\n\n<p>People immediately sought out validation of these files by bringing in the opinion of former Nintendo employees who in fact confirmed them to be valid as they have seen the exact files during their work days at Nintendo. Especially the sheer size and the granular detail of the information would speak for its validity <sup>[13]<\/sup>.<\/p>\n\n\n\n<p>Besides the leaks of the console source code, several game ROMS and SVN repositories were leaked, which covered the following Nintendo consoles and handhelds: SNES, Famicon\/NES, Gameboy, Gameboy Color and N64 <sup>[11]<\/sup>. The repositories revealed unused assets directly tied to the game or even related to Nintendo&#8217;s future game projects which were created as initial prototypes <sup>[13]<\/sup>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-8.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"421\" data-attachment-id=\"25223\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/07\/31\/the-nintendo-gigaleak-incident\/grafik-8-2\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-8.png\" data-orig-size=\"2436,1002\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"grafik-8\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-8-1024x421.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-8-1024x421.png\" alt=\"\" class=\"wp-image-25223\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-8-1024x421.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-8-300x123.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-8-768x316.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-8-1536x632.png 1536w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-8-2048x842.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">The development cycle surrounding the creation of the Hyrule field in the Nintendo 64 game &#8220;Zelda: Ocarina of Time&#8221; <sup>[I3]<\/sup>.<\/figcaption><\/figure>\n\n\n\n<p>These types of leaks sparked discussion but also caused concern as private conversations between members of the development team were found within the source code and repository history, including some very private mail exchanges. The former lead developer of Star Fox especially commented on the fact that he was frustrated by the public discussion on the source code comments and that many did not understand the technological leap in utilizing one of the first multi-threaded tokenized script languages for a video game <sup>[14]<\/sup>.<\/p>\n\n\n\n<p>As the public would marvel over the findings of the leaks, the tightlipped community focused on game preservation would find themselves in a difficult spot if Nintendo decided to tighten up their security in response to the leaks. On the other hand, it would serve as solace to those who were affected by the Nintendo account breaches back in March 2020 <sup>[14]<\/sup>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"553\" height=\"687\" data-attachment-id=\"25210\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/07\/31\/the-nintendo-gigaleak-incident\/grafik-2-4\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-2.png\" data-orig-size=\"553,687\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"grafik-2\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-2.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-2.png\" alt=\"\" class=\"wp-image-25210\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-2.png 553w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-2-241x300.png 241w\" sizes=\"auto, (max-width: 553px) 100vw, 553px\" \/><\/a><figcaption class=\"wp-element-caption\">Former Nintendo employees would find themselves in a nostalgic rush from seeing screenshots of their old work tools resurface from several decades ago <sup>[I4]<\/sup>.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/alttp.png\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"475\" data-attachment-id=\"25211\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/07\/31\/the-nintendo-gigaleak-incident\/alttp\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/alttp.png\" data-orig-size=\"640,475\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"alttp\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/alttp.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/alttp.png\" alt=\"\" class=\"wp-image-25211\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/alttp.png 640w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/alttp-300x223.png 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption class=\"wp-element-caption\">A peek in the source code of Zelda: A Link to the Past, for the SNES <sup>[Ix]<\/sup>.<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"aioseo-third-fifth-leak-september-2020\">Third-Fifth Leak: September 2020<\/h3>\n\n\n\n<p>After an uneventful month of August, the leaks continued in September. The first of the September leaks happened on the first week with documents surfacing about two unreleased GameCube models. The first model would resemble the current Nintendo Switch as the model specification of this hybrid console version would list a built-in display and the ability to be connected to a TV via docking station <sup>[15]<\/sup>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-3.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"647\" data-attachment-id=\"25212\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/07\/31\/the-nintendo-gigaleak-incident\/grafik-3-4\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-3.png\" data-orig-size=\"1473,930\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"grafik-3\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-3-1024x647.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-3-1024x647.png\" alt=\"\" class=\"wp-image-25212\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-3-1024x647.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-3-300x189.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-3-768x485.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-3.png 1473w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">The leaked specification of a GameCube hybrid-console version would include a docking station with ports for external controllers, memory cards and a disc-drive for GameCube game discs <sup>[I5]<\/sup>.<\/figcaption><\/figure>\n\n\n\n<p>The second model with its codename &#8216;Tako&#8217; would render games at HP video resolutions. The model with its high specs would be thought of as an competitive answer to the XBOX360 and the PlayStation 3. It is unclear how far this console consideration went in terms of prototype manufacturing as nothing but its specifications was leaked <sup>[16]<\/sup>.<\/p>\n\n\n\n<p>Just one week later, a fourth set of leaks happened with a very sizeable amount of data. It&#8217;s informal name would be titled &#8220;Gigaleak 3&#8221; due to the sheer size of leaked materials but the actual numbering would stay inconsistent with the transpired events and public retelling. The fourth set of leaks contained internal documents for Wii Sports and Wii Sports Resort for the Nintendo Wii, and also various source code repositories for the portable Nintendo DSi handheld and DSi apps. The leak also contained numerous unreleased GameBoy games alongside prototypes of unreleased localized versions, many of which were thought to have never existed <sup>[17] [18]<\/sup>. The most notable content of this leak was the entire source code for Pokemon Platinum, hence why some also called this leak set the &#8220;Platinum Leak&#8221; <sup>[19]<\/sup>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-4.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" data-attachment-id=\"25216\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/07\/31\/the-nintendo-gigaleak-incident\/grafik-4-3\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-4.png\" data-orig-size=\"1200,675\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"grafik-4\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-4-1024x576.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-4-1024x576.png\" alt=\"\" class=\"wp-image-25216\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-4-1024x576.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-4-300x169.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-4-768x432.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-4.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Leaks of the Nintendo Wii reveals interesting prototype designs for the Wii Remote <sup>[I6]<\/sup>.<\/figcaption><\/figure>\n\n\n\n<p>On the last day of September, the fifth set of leaks happened with debug and demo ROMs of various Poekmon games including Pokemon Ranger, Pokemon Mystery Dungeon and the FireRed\/LeafGreen remakes. These builds were primarily used for quality assurance and E3 demo panels. The leaks also contained SDKs for the Nintendo DS and source code repositories for the 3DS boot ROMs <sup>[20]<\/sup>. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"aioseo-third-fifth-leak-september-2020\">Sixth-Eighth Leak: October 2020<\/h3>\n\n\n\n<p>The month of October would see three individual sets of leaks yet again but the topic would stay solely focused on Nintendo&#8217;s Pokemon games for the Nintendo 3DS handheld and the Nintendo Switch. The first set included source code repositories of Pokemon Sun an Moon and their rereleases UltraSun and UltraMoon <sup>[21]<\/sup>. The seventh leak contained source code repositories for Pokemon Sword and Shield including prototype UI designs and beta builds which were based off Pokemon Sun and Moon. Although the files within the leaks were password-protected, they were easily brute-forced <sup>[22]<\/sup>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-5.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" data-attachment-id=\"25220\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/07\/31\/the-nintendo-gigaleak-incident\/grafik-5-3\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-5.png\" data-orig-size=\"1280,720\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"grafik-5\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-5-1024x576.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-5-1024x576.png\" alt=\"\" class=\"wp-image-25220\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-5-1024x576.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-5-300x169.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-5-768x432.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-5.png 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Based on Pokemon Sun and Moon, leaks of early build of Pokemon Sword and Shield seemed to suggest various features that ended up being scrapped from the actual release (most notably the minimap) <sup>[I7]<\/sup>.<\/figcaption><\/figure>\n\n\n\n<p>The last October leak contained another password-protected archive of a more recent build of Pokemon Sword. The leak itself did not receive much traction on the internet as most information could be traced with the early leaks of Pokemon Sword.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"aioseo-ninth-leak-december-2020\">Ninth Leak: December 2020<\/h3>\n\n\n\n<p>Another leak happened on December 2020, now we exclusive info about the development and design specifications of the Nintendo Switch with an included SDK from 2015 and related documents about security details. The design mockups visualizes the Nintendo Switch prototype to have a circular shaped display and far less powerful hardware than the finalized product. The initial concept of the Nintendo Switch was that of a stronger Nintendo 3DS with no docking capabilities but instead communicating with the television wirelessly <sup>[23]<\/sup>. <\/p>\n\n\n\n<p>Besides the information about the Nintendo Switch, the leak also contained secretive information about Nintendo&#8217;s surveillance protocols in concern to a Belgian hacker and the subsequent attempts to recruit and hire him [23]. This Belgian hacker by their online handle Neimod and codename &#8220;Belgian Waffle&#8221; was active in the 3DS homebrew scene with a history of hacking Nintendo-related products. Nintendo&#8217;s surveillance resulted in a portfolio of Neimod&#8217;s daytime activities and even included his engagement with family, occupation and close friends <sup>[24]<\/sup>. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-7.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"464\" data-attachment-id=\"25222\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/07\/31\/the-nintendo-gigaleak-incident\/grafik-7-3\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-7.png\" data-orig-size=\"1440,652\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"grafik-7\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-7-1024x464.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-7-1024x464.png\" alt=\"\" class=\"wp-image-25222\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-7-1024x464.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-7-300x136.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-7-768x348.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-7.png 1440w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Nintendo&#8217;s internal files on surveillance and subsequent hiring attempts of hacker\/homebrewer Neimod leaked which caused a plethora of web discussion on individual privacy and the scope of Nintendo&#8217;s counter-intelligence efforts <sup>[I8]<\/sup>.<\/figcaption><\/figure>\n\n\n\n<p>Lastly, the leaks included the source code repository for the Nintendo Switch boot ROM that was affecting both hardware revisions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"aioseo-tenth-leak\">Tenth Leak: July 2021<\/h3>\n\n\n\n<p>After a long hiatus, the Gigaleak continued with one final leak on the 20th of July. The leaks included the source code of Nintendo Wii&#8217;s Service program and several prototype builds of Pokemon X and Y, Pokemon Emerald, Pokemon Diamond and Pealr and Pokemon Let&#8217;s Go Eevee!. It also included the full development repository for the cancelled iQue Box, which was the successor to the china-only iQue and all related documentation <sup>[25]<\/sup>. <\/p>\n\n\n\n<p>Lastly, it also contained the personal email inbox of Murakawa Tsushin, who is a Nintendo employee and in charge of the localization from Japanese to Korean and English and handful of other European languages. The fact that this particular mail box was included in the leaks would later become another important clue for the investigation of the main perpetrator of the Gigaleak incidents <sup>[26] [27]<\/sup>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"aioseo-the-perpetrators\">The Perpetrators<\/h2>\n\n\n\n<p>In order to search for the perpetrator who initiated the leaks, it is important to clarify the means in which the files were obtained and the time periods of the leaked information. when discussing the time frame of the first and second leak incident, the leaks happened on two different platforms: the PRET discord server and 4chan. It is highly plausible by the file formats and structure, that the source was likely the same. <\/p>\n\n\n\n<p>The first indicator was the unique file format found in the leaks which were specific to BroadOn&#8217;s development tools. BroadOn was a software engineering company who was contracted by Nintendo to develop Wii hardware and software. Many of the Wii specifications found in the leaks were exclusively accessible only by the BroadOn company. So the suspicion was that either BroadOn&#8217;s security was compromised and their server was leaking data or the perpetrators were working as employees at BroadOn <sup>[28]<\/sup>.<\/p>\n\n\n\n<p>As time went on and numerous other leaks surfaced, it would seem that the leakers were in possession of far more material than BroadOn&#8217;s reach could suggest. Due to how the leaks were systematically uploaded and distributed to the internet, it would seem that the leaker would incorporate the help of several of their trusted acquaintances who would then spread the files as their proxy. The leaker themselves would adopt several different nicknames and online handles for each occassion. For the purposes of sharing files and plan the leaks, they would found Team Spaceworld (TSW) and use the Glitch City Laboratories forum to spread insights and files prior to their leaks on 4chan <sup>[29]<\/sup>. As Nintendo would trace back the amount of material leaked to the past incidents of Nintendo server access infringements, they would soon stumble upon the name of Zammis Clark, who was previously pleaded guilty for infiltrating Microsoft and Nintendo&#8217;s servers between March and May of 2018 <sup>[30]<\/sup>.<\/p>\n\n\n\n<p>In search for validating Zammis Clark to be the perpetrator, they traced back all of his aliases including SlipStream, wack0, Riley, Raichain, Raylee. Many of his online handles could be traced back even to his participations in pokemon challenge romhacks where he openly used these aliases <sup>[31]<\/sup>. Clark, at the time of his server infiltrations, worked as a security expert at Malwarebytes and had an unusual obsession with Nintendo and Pokemon.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"aioseo-the-breach\">The Breach<\/h3>\n\n\n\n<p>Assumingly, Clark gained access to Nintendo&#8217;s internal network via VPN and then obtained 2,365 usernames and passwords. During the time frame of March and May of 2018, he illegally obtained material in size of at least 2 terabytes and then distributed them to his close friends who would then leak the files on 4chan on his behalf. Even though Zammis Clark was sentenced to 15-months in prison, his condition and the mercy of the judge spared him from prison <sup>[32]<\/sup>.<\/p>\n\n\n\n<p>Even after Zammis Clark ceased any activities surrounding the distribution of leaks or supporting any third party actions that would be incriminating, the damage was already done. More than 2 terabytes of uncompressed information was on the internet and ready to be leaked <sup>[33]<\/sup>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-9.png\"><img loading=\"lazy\" decoding=\"async\" width=\"284\" height=\"140\" data-attachment-id=\"25225\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/07\/31\/the-nintendo-gigaleak-incident\/grafik-9-2\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-9.png\" data-orig-size=\"284,140\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"grafik-9\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-9.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/grafik-9.png\" alt=\"\" class=\"wp-image-25225\"\/><\/a><figcaption class=\"wp-element-caption\">A screenshot purposely showing the total amount of files of the leaked data <sup>[I9]<\/sup>.<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"aioseo-nintendos-response\">Nintendo&#8217;s Response in concern to security<\/h2>\n\n\n\n<p>In Nintendo&#8217;s 82nd Annual General Meeting of Shareholders in 2022, Nintendo addressed the security concerns surrounding the 2020 leaks. Nintendo&#8217;s president Shuntaro Furukawa had stated that in concern to information security, they have introduced an information security management system and an Information Security Committee. Additionally, Nintendo had established policies for information management which also adopted countermeasures both in physical and technical manners. Nintendo also confirmed that they will cooperate with outside specialists and conduct diagnostics to check for any potential security issues. Lastly, Nintendo will raise awareness of information security among their employees through training and other means to discourage malicious social engineering <sup>[34]<\/sup>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"aioseo-closure\">Closure<\/h2>\n\n\n\n<p>The later half of 2020 proved to be a hectic time period as old gaming myths and rumors were solved and answered. Of more than 2 terabytes of data leaked, only several gigabytes was released to the public via uploads. And from the leaked materials, some of them even dated as far back as 1980. The Nintendo Gigaleak is considered the biggest dump of illegally obtained information in gaming history. For fans and video game preservationists, the Gigaleaks were both insightful and meaningful as for example in 2021, the leaks of Super Mario Advance&#8217;s source code was used to recreate music that would sound native prior to being compressed to fit hardware limitations <sup>[35]<\/sup>.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/CxKTbcs1t7M?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\"><\/iframe><\/span>\n<\/div><figcaption class=\"wp-element-caption\">As Super Mario Advance and Super Mario World shared the same internal instruments, Mario fans could reuse the original source samples to recreate Super Mario World&#8217;s soundtrack &#8211; and revive timeless music to a state that is worthy of being preserved <sup>[I10]<\/sup>.<\/figcaption><\/figure>\n\n\n\n<p>Although the means to achieve the Gigaleak was malicious and negligent, depending on the point of view and use case, Nintendo&#8217;s Gigaleak serves as another example that video games are a work of art and active game preservation can happen through the development studio or also by the overly proactive fanbase alike.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"aioseo-wq\">Sources<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"aioseo-references\">References<\/h3>\n\n\n\n<p>[1] Macrotrends. Nintendo Revenue 2010-2022 | NTDOY. published on 30.11.22. https:\/\/www.macrotrends.net\/stocks\/charts\/NTDOY\/nintendo\/revenue (last accessed: 29.07.23)<\/p>\n\n\n\n<p>[2] Shirey, J Brodie. Nintendo Confirms that 160,000 Accounts Have Been Hacked. published on 24.04.20. <a href=\"https:\/\/screenrant.com\/nintendo-hack-160-thousand-accounts\/\">https:\/\/screenrant.com\/nintendo-hack-160-thousand-accounts\/<\/a> (last accessed: 29.07.23)<\/p>\n\n\n\n<p>[3] Cimpanu, Cimpanu. Nintendo says 160,000 users impacted in recent account hacks. published on 24.04.20. <a href=\"https:\/\/www.zdnet.com\/article\/nintendo-says-160000-users-impacted-in-recent-account-hacks\/\">https:\/\/www.zdnet.com\/article\/nintendo-says-160000-users-impacted-in-recent-account-hacks\/<\/a> (last accessed: 29.07.23)<\/p>\n\n\n\n<p>[4] Hope, Alice. Hackers Breached Over 160,000 Nintendo Accounts and Misused Payment Information, the Company Admits. published on 05.05.20. <a href=\"https:\/\/www.cpomagazine.com\/cyber-security\/hackers-breached-over-160000-nintendo-accounts-and-misused-payment-information-the-company-admits\/\">https:\/\/www.cpomagazine.com\/cyber-security\/hackers-breached-over-160000-nintendo-accounts-and-misused-payment-information-the-company-admits\/<\/a> (last accessed: 29.07.23)<\/p>\n\n\n\n<p>[5] Niwanetwork. 2018-2020 Nintendo, Microsoft data breaches. published on 21.10.20. <a href=\"https:\/\/niwanetwork.org\/wiki\/2018-2020_Nintendo,_Microsoft_data_breaches\">https:\/\/niwanetwork.org\/wiki\/2018-2020_Nintendo,_Microsoft_data_breaches<\/a> (last accessed: 29.07.23)<\/p>\n\n\n\n<p>[6] Klepek, Patrick. A Massive Leak of Nintendo Source Code Is Causing Chaos in Video Games. published on 28.07.20. <a href=\"https:\/\/www.vice.com\/en\/article\/7kp7bx\/a-massive-leak-of-nintendo-source-code-is-causing-chaos-in-video-games\">https:\/\/www.vice.com\/en\/article\/7kp7bx\/a-massive-leak-of-nintendo-source-code-is-causing-chaos-in-video-games<\/a> (last accessed: 29.07.23)<\/p>\n\n\n\n<p>[7] Glitch City Laboratories Archives. Clarification on Recent Events. published on 05.09.20. <a href=\"https:\/\/archives.glitchcity.info\/forums\/board-2\/thread-8950\/page-0.html\">https:\/\/archives.glitchcity.info\/forums\/board-2\/thread-8950\/page-0.html<\/a> (last accessed: 29.07.23)<\/p>\n\n\n\n<p>[8] Retroreversing. Reversing Pokemon Red and Blue (Game Boy). published on 21.07.23. <a href=\"https:\/\/www.retroreversing.com\/pokemonredblue\">https:\/\/www.retroreversing.com\/pokemonredblue<\/a> (last accessed: 29.07.23)<\/p>\n\n\n\n<p>[9] Wikiwand. Nintendo data leak. published on 08.09.20. <a href=\"https:\/\/www.wikiwand.com\/en\/2020\u201321_Nintendo_data_leak\">https:\/\/www.wikiwand.com\/en\/2020%E2%80%9321_Nintendo_data_leak<\/a> (last accessed: 29.07.23)<\/p>\n\n\n\n<p>[10] Radulovic, Petrana. The best parts of the Pok\u00e9mon Gold demo leaks are the early Pok\u00e9mon designs. published on 31.05.18. <a href=\"https:\/\/www.polygon.com\/2018\/5\/31\/17413826\/pokemon-gold-demo-leak\">https:\/\/www.polygon.com\/2018\/5\/31\/17413826\/pokemon-gold-demo-leak<\/a> (last accessed: 29.07.23)<\/p>\n\n\n\n<p>[11] Retroreversing. Gigaleak &#8211; SNES Source Code Leak. published on 03.09.20. <a href=\"https:\/\/www.retroreversing.com\/gigaleak\">https:\/\/www.retroreversing.com\/gigaleak<\/a> (last accessed: 29.07.23)<\/p>\n\n\n\n<p>[12] Hernandez, Patricia. Massive Nintendo leak reveals early Mario, Zelda, and Pok\u00e9mon secrets. published on 26.07.20. <a href=\"https:\/\/www.polygon.com\/2020\/7\/26\/21339018\/nintendo-gigaleak-super-mario-64-zelda-pokemon-what-is-it-snes\">https:\/\/www.polygon.com\/2020\/7\/26\/21339018\/nintendo-gigaleak-super-mario-64-zelda-pokemon-what-is-it-snes<\/a>  (last accessed: 29.07.23)<\/p>\n\n\n\n<p>[13] Fingas, Jon. Nintendo &#8216;gigaleak&#8217; reveals the classic games that never were. published on 26.07.20. <a href=\"https:\/\/www.engadget.com\/nintendo-game-code-art-leak-232524453.html\">https:\/\/www.engadget.com\/nintendo-game-code-art-leak-232524453.html<\/a> (last accessed: 29.07.23)<\/p>\n\n\n\n<p>[14] Simmons, Nathan. The Truth Behind The Epic Nintendo Leak. published on 27.07.20. <a href=\"https:\/\/www.svg.com\/230528\/the-truth-behind-the-epic-nintendo-leak\/\">https:\/\/www.svg.com\/230528\/the-truth-behind-the-epic-nintendo-leak\/<\/a> (last accessed: 29.07.23)<\/p>\n\n\n\n<p>[15] McFerran, Damien. Turns Out Nintendo Was Thinking About A Switch-Style Device Back In The GameCube Era. published on 03.09.20. <a href=\"https:\/\/www.nintendolife.com\/news\/2020\/09\/turns_out_nintendo_was_thinking_about_a_switch-style_device_back_in_the_gamecube_era\">https:\/\/www.nintendolife.com\/news\/2020\/09\/turns_out_nintendo_was_thinking_about_a_switch-style_device_back_in_the_gamecube_era<\/a> (last accessed: 30.07.23)<\/p>\n\n\n\n<p>[16] Strickland, Derek. Before the Switch, Nintendo had a portable Gamecube hybrid. published on 07.09.20. <a href=\"https:\/\/www.tweaktown.com\/news\/74947\/before-the-switch-nintendo-had-portable-gamecube-hybrid\/index.html\">https:\/\/www.tweaktown.com\/news\/74947\/before-the-switch-nintendo-had-portable-gamecube-hybrid\/index.html<\/a> (last accessed: 30.07.23)<\/p>\n\n\n\n<p>[17] Walker, Ian. New Nintendo Leak Includes Numerous Unreleased Game Boy Games. published on 10.09.20. <a href=\"https:\/\/kotaku.com\/new-nintendo-leak-includes-several-unreleased-game-boy-1845017212\">https:\/\/kotaku.com\/new-nintendo-leak-includes-several-unreleased-game-boy-1845017212<\/a> (last accessed: 30.07.23)<\/p>\n\n\n\n<p>[18] Richards, Brian. Wii Sports included in latest Nintendo leak, shows Miis with ears and jetpack mini game. published on 13.09.20. <a href=\"https:\/\/nintendoeverything.com\/wii-sports-included-in-latest-nintendo-leak-shows-miis-with-ears-and-jetpack-mini-game\/\">https:\/\/nintendoeverything.com\/wii-sports-included-in-latest-nintendo-leak-shows-miis-with-ears-and-jetpack-mini-game\/<\/a> (last accessed: 30.07.23)<\/p>\n\n\n\n<p>[19] Retroreversing. Nintendo Platinum Leak. published on 19.09.20. <a href=\"https:\/\/www.retroreversing.com\/platinumleak\">https:\/\/www.retroreversing.com\/platinumleak<\/a> (last accessed: 30.07.23)<\/p>\n\n\n\n<p>[20] Ryccardo. The Gigaleak 5 (Pok\u00e9mon spinoffs and FDS master disks). published on 30.09.20. <a href=\"https:\/\/gbatemp.net\/threads\/the-gigaleak-5-pokemon-spinoffs-and-fds-master-disks.574759\/\">https:\/\/gbatemp.net\/threads\/the-gigaleak-5-pokemon-spinoffs-and-fds-master-disks.574759\/<\/a> (last accessed: 30.07.23)<\/p>\n\n\n\n<p>[21] Ryccardo. Pok\u00e9mon 7th\/8th gens &amp; Wii service discs leaked (The Gigaleak 6). published on 17.10.20. <a href=\"https:\/\/gbatemp.net\/threads\/pokemon-7th-8th-gens-wii-service-discs-leaked-the-gigaleak-6.575701\/\">https:\/\/gbatemp.net\/threads\/pokemon-7th-8th-gens-wii-service-discs-leaked-the-gigaleak-6.575701\/<\/a> (last accessed: 30.07.23)<\/p>\n\n\n\n<p>[22] Hernandez, Patricia. Pok\u00e9mon Sword and Shield beta has unprecedented leak. published on 22.10.20. <a href=\"https:\/\/www.polygon.com\/2020\/10\/22\/21528532\/pokemon-sword-shield-leak-beta-prototype-early-build-cut-monsters-nintendo-switch-game-freak-4chan\">https:\/\/www.polygon.com\/2020\/10\/22\/21528532\/pokemon-sword-shield-leak-beta-prototype-early-build-cut-monsters-nintendo-switch-game-freak-4chan<\/a> (last accessed: 30.07.23)<\/p>\n\n\n\n<p>[23] Robinson, Andy. Nintendo has reportedly suffered another major data leak, now related to Switch. published on 22.12.20. <a href=\"https:\/\/www.videogameschronicle.com\/news\/nintendo-has-reportedly-suffered-another-major-data-leak-now-related-to-switch\/\">https:\/\/www.videogameschronicle.com\/news\/nintendo-has-reportedly-suffered-another-major-data-leak-now-related-to-switch\/<\/a> (last accessed: 30.07.23)<\/p>\n\n\n\n<p>[24] Dirkes, Jonas. Nintendo: Switch-Hacker werden gejagt \u2013 Schock-Taktiken geleakt. published on 26.01.21. <a href=\"https:\/\/www.ingame.de\/news\/nintendo-switch-leak-hacker-geheim-dokumente-neimod-belgien-twitter-90150247.html\">https:\/\/www.ingame.de\/news\/nintendo-switch-leak-hacker-geheim-dokumente-neimod-belgien-twitter-90150247.html<\/a> (last accessed: 30.07.23)<\/p>\n\n\n\n<p>[25]  UltimatePopCulture. 2020\u201321 Nintendo data leak. published on 08.09.20. <a href=\"https:\/\/ultimatepopculture.fandom.com\/wiki\/2020%E2%80%9321_Nintendo_data_leak\">https:\/\/ultimatepopculture.fandom.com\/wiki\/2020%E2%80%9321_Nintendo_data_leak<\/a> (last accessed: 30.07.23)<\/p>\n\n\n\n<p>[26] Retroreversing. The Unexpected 2021 Nintendo Leak. published on 21.07.23. <a href=\"https:\/\/www.retroreversing.com\/nintendo-2021-leak\">https:\/\/www.retroreversing.com\/nintendo-2021-leak<\/a> (last accessed: 30.07.23)<\/p>\n\n\n\n<p>[27] Retroreversing. Nintendo Hidemaru Mail Leak. published on 21.07.23. <a href=\"https:\/\/www.retroreversing.com\/nintendo-hidemaru-mail-leak\">https:\/\/www.retroreversing.com\/nintendo-hidemaru-mail-leak<\/a> (last accessed: 30.07.23)<\/p>\n\n\n\n<p>[28] Robinson, Andy. Nintendo has reportedly suffered a significant legacy console leak. published on 04.05.20. <a href=\"https:\/\/www.videogameschronicle.com\/news\/nintendo-has-reportedly-suffered-a-significant-legacy-console-leak\/\">https:\/\/www.videogameschronicle.com\/news\/nintendo-has-reportedly-suffered-a-significant-legacy-console-leak\/<\/a> (last accessed: 31.07.23)<\/p>\n\n\n\n<p>[29] RareGamingDump. Zammis Clark Breach. published on 26.05.21. <a href=\"https:\/\/wiki.raregamingdump.ca\/index.php\/Zammis_Clark_Breach\">https:\/\/wiki.raregamingdump.ca\/index.php\/Zammis_Clark_Breach<\/a> (last accessed: 31.07.23)<\/p>\n\n\n\n<p>[30] Kan, Michael. Wii Hacker: Leaked Source Code for Nintendo Gaming Systems Is &#8216;Nonsense&#8217;. published on 05.05.20. <a href=\"https:\/\/www.pcmag.com\/news\/report-source-code-for-older-nintendo-gaming-systems-leaks-online \">https:\/\/www.pcmag.com\/news\/report-source-code-for-older-nintendo-gaming-systems-leaks-online <\/a>(last accessed: 31.07.23)<\/p>\n\n\n\n<p>[31] Youtube. TheZZAZZGlitch&#8217;s April Fools event 2018 &#8211; the results!. published on 09.04.18. <a href=\"https:\/\/youtu.be\/ro9sH2qHyD8?t=32\">https:\/\/youtu.be\/ro9sH2qHyD8?t=32<\/a> (last accessed: 31.07.23)<\/p>\n\n\n\n<p>[32] Warren, Tom. Security researcher pleads guilty to hacking into Microsoft and Nintendo. published on 28.03.19. <a href=\"https:\/\/www.theverge.com\/2019\/3\/28\/18286027\/microsoft-nintendo-vtech-security-hack-breach-researcher-guilty\">https:\/\/www.theverge.com\/2019\/3\/28\/18286027\/microsoft-nintendo-vtech-security-hack-breach-researcher-guilty<\/a> (last accessed: 31.07.23)<\/p>\n\n\n\n<p>[33] Klepek, Patrick. A Massive Leak of Nintendo Source Code Is Causing Chaos in Video Games. published on 28.07.20. <a href=\"https:\/\/www.vice.com\/en\/article\/7kp7bx\/a-massive-leak-of-nintendo-source-code-is-causing-chaos-in-video-games\">https:\/\/www.vice.com\/en\/article\/7kp7bx\/a-massive-leak-of-nintendo-source-code-is-causing-chaos-in-video-games<\/a> (last accessed: 29.07.23)<\/p>\n\n\n\n<p>[34] Nintendo. Q&amp;A Summary. published on 04.07.22. <a href=\"https:\/\/www.nintendo.co.jp\/ir\/pdf\/2022\/qa2206e.pdf\">https:\/\/www.nintendo.co.jp\/ir\/pdf\/2022\/qa2206e.pdf<\/a> (last accessed: 31.07.23)<\/p>\n\n\n\n<p>[35] Porter, Jon. Listen to this amazing remaster of Super Mario World\u2019s soundtrack. published on 05.02.21. <a href=\"https:\/\/www.theverge.com\/tldr\/2021\/2\/5\/22267967\/super-mario-world-restored-soundtrack-audio-samples-gigaleak\">https:\/\/www.theverge.com\/tldr\/2021\/2\/5\/22267967\/super-mario-world-restored-soundtrack-audio-samples-gigaleak<\/a> (last accessed: 31.07.23)<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"aioseo-image-sources\">Image Sources<\/h3>\n\n\n\n<p>[I1] <a href=\"https:\/\/www.eurogamer.net\/pokemon-designs-leak-from-gold-and-silver-demo\">https:\/\/www.eurogamer.net\/pokemon-designs-leak-from-gold-and-silver-demo<\/a><\/p>\n\n\n\n<p>[I2] <a href=\"https:\/\/www.polygon.com\/2018\/5\/31\/17413826\/pokemon-gold-demo-leak\">https:\/\/www.polygon.com\/2018\/5\/31\/17413826\/pokemon-gold-demo-leak<\/a><\/p>\n\n\n\n<p>[I3] https:\/\/nintendo-online.de\/artikel\/report\/40338\/inside-nintendo-188-die-spektakulaersten-entdeckungen-des-nintendo-gigaleaks-2020-teil-3<\/p>\n\n\n\n<p>[I4] https:\/\/twitter.com\/dylancuthbert\/status\/1286789583061934080<\/p>\n\n\n\n<p>[I5] https:\/\/twitter.com\/toruzz\/status\/1301198144013824000<\/p>\n\n\n\n<p>[I6] https:\/\/techraptor.net\/gaming\/news\/new-nintendo-gigaleak-files-show-wiimote-prototypes-and-more<\/p>\n\n\n\n<p>[I7] https:\/\/twitter.com\/Lewchube\/status\/1319034284422955008<\/p>\n\n\n\n<p>[I8] https:\/\/twitter.com\/forestillusion\/status\/1341230631913541633<\/p>\n\n\n\n<p>[I9] https:\/\/wiki.raregamingdump.ca\/index.php\/Zammis_Clark_Breach<\/p>\n\n\n\n<p>[I10] https:\/\/www.youtube.com\/watch?v=CxKTbcs1t7M<\/p>\n\n\n\n<p>[Ix] self-procured<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is not a secret that many big corporations and companies conceal sensitive data and projects from the public. In concern to video game companies, many of these internal game-related projects would never see the light of day even though there had already been a lot of money and time put into them. When these [&hellip;]<\/p>\n","protected":false},"author":1128,"featured_media":25231,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1,26],"tags":[74,58],"ppma_author":[899],"class_list":["post-24933","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allgemein","category-secure-systems","tag-games","tag-secure-systems"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/nintendogigaleak.png","jetpack-related-posts":[{"id":1333,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/08\/13\/mirageos\/","url_meta":{"origin":24933,"position":0},"title":"MirageOS","author":"Simon Lipke","date":"13. August 2016","format":false,"excerpt":"Introduction MirageOS is a new and rising trend when it comes to talking about cloud computing. More and more services are being relocated into modern cloud infrastructures, due to a lot of advantages like i.e. reduced costs, maximum flexibility and high performance. Todays services normally depend on big virtual machines\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"mirage-header4","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/08\/mirage-header4.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/08\/mirage-header4.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/08\/mirage-header4.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/08\/mirage-header4.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":1004,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/07\/21\/rust-fast-and-secure\/","url_meta":{"origin":24933,"position":1},"title":"Rust &#8211; fast and secure","author":"Jakob Schaal","date":"21. July 2016","format":false,"excerpt":"Rust, a fairly new programming language promises to be fast and secure. The following blog entry discusses how Rust tries to achieve these two goals. The key concept is that every resource always belongs to exactly one variable. More precisely one lifetime, which is normally automatically created on variable creation.\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/Rust_programming_language_black_logo.svg_.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1829,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/03\/01\/game-project-build-system\/","url_meta":{"origin":24933,"position":2},"title":"Choosing the correct build system for your game project","author":"Marvin Pohl","date":"1. March 2017","format":false,"excerpt":"In this blog entry we take a look at Travis CI, Jenkins, Gitlab CI and Buildbot and evaluate their benefits and downsides when trying to build a content heavy project with it (e.g. games). Requirements To identify our requirements we first take a look at our typical project structure and\u2026","rel":"","context":"In &quot;DevOps&quot;","block_context":{"text":"DevOps","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/scalable-systems\/devops\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/logo.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/logo.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/logo.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":26146,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2024\/02\/29\/using-keycloak-as-iam-for-our-hosting-provider-service\/","url_meta":{"origin":24933,"position":3},"title":"Using Keycloak as IAM for our hosting provider service","author":"Dennis Schmidt","date":"29. February 2024","format":false,"excerpt":"Discover how Keycloak can revolutionize your IAM strategy and propel your projects to new heights of security and efficiency.","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/02\/stmk_diagrams_en.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":11763,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2020\/09\/30\/peer2peer-multiplayer-real-time-strategy-game-admiral-ww2\/","url_meta":{"origin":24933,"position":4},"title":"Peer2Peer Multiplayer Real-time Strategy Game \u201cAdmiral: WW2\u201d","author":"Paul Mieschke","date":"30. September 2020","format":false,"excerpt":"3D Unity Peer-to-Peer Multiplayer Game Admiral: WW2","rel":"","context":"In &quot;Cloud Technologies&quot;","block_context":{"text":"Cloud Technologies","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/scalable-systems\/cloud-technologies\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/09\/AdmiralWW2_Architecture_Overview.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/09\/AdmiralWW2_Architecture_Overview.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/09\/AdmiralWW2_Architecture_Overview.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":4241,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/09\/06\/blockchain-risks-and-chances-2018-overview\/","url_meta":{"origin":24933,"position":5},"title":"Blockchain Risks and Chances \u2013 An 2018 Overview on Public and Private Blockchain, Smart Contracts, DAOs and ICOs","author":"Pirmin Rehm","date":"6. September 2018","format":false,"excerpt":"A few years ago, talking about Blockchain was largely consistent with talking about the technology behind Bitcoin. In contrast, Blockchain nowadays comprises a whole technology branch, whereby the Blockchain itself can be implemented in lots of various ways. Not a year ago, on December 17, 2018, the peak of the\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/09\/bc-layers.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/09\/bc-layers.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/09\/bc-layers.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/09\/bc-layers.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/09\/bc-layers.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/09\/bc-layers.png?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":899,"user_id":1128,"is_guest":0,"slug":"ngoc_ton","display_name":"Ngoc Ton","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/a051196441c601c26dc341dc77aa5fae3ff2e587dd3041acce91ac135fb04642?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/24933","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/1128"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=24933"}],"version-history":[{"count":25,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/24933\/revisions"}],"predecessor-version":[{"id":25309,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/24933\/revisions\/25309"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media\/25231"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=24933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=24933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=24933"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=24933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}