Nintendo 3rd party dock restrictions: Difference between revisions
Removed title from lead section. |
|||
(One intermediate revision by one other user not shown) | |||
Line 1: | Line 1: | ||
{{Stub}} | |||
{{IncidentCargo | {{IncidentCargo | ||
|Company=Nintendo, Antank, Genki | |Company=Nintendo, Antank, Genki | ||
Line 8: | Line 9: | ||
|Description=Nintendo has placed an encryption method on the bottom USB C Port of the Switch 2 in order to make it harder for 3rd party docks to be manufactured. | |Description=Nintendo has placed an encryption method on the bottom USB C Port of the Switch 2 in order to make it harder for 3rd party docks to be manufactured. | ||
}} | }} | ||
With the release of Nintendo Switch 2, Nintendo added encryption methods to the bottom of the consoles USB C port. Using a new encryption method as well as an encryption chip. The USB C port will communicate with the cable inside the dock, giving it specific instructions on the correct amount of power delivery to the console as well as permissions for video output. This is believed to be intentional, in order to keep the console from connecting to any USB C accessory not given approval by Nintendo, as well as disallowing 3rd party manufacturers from making docks that will work with Switch 2 in the long term, as firmware updates cause these 3rd party docks to become ineffective and unsuable with the console. | With the release of Nintendo Switch 2, Nintendo added encryption methods to the bottom of the consoles USB C port. Using a new encryption method as well as an encryption chip. The USB C port will communicate with the cable inside the dock, giving it specific instructions on the correct amount of power delivery to the console as well as permissions for video output. This is believed to be intentional, in order to keep the console from connecting to any USB C accessory not given approval by Nintendo, as well as disallowing 3rd party manufacturers from making docks that will work with Switch 2 in the long term, as firmware updates cause these 3rd party docks to become ineffective and unsuable with the console. | ||
==Consumer response== | |||
== | |||
Sean Hollister, senior editor at the verge, tested these encryption methods. Using a diagnostic device, Hollister took note of the data being transferred between the Nintendo Switch 2 and the dock that comes with the console. He noticed that the 2 devices communicate and respond with eachother over 30 times before video output is confirmed.<ref>{{Cite web |last=Hollister |first=Sean |date=2025-07-02 |title=How Nintendo Locked down the switch 2's usb C port and broke third party docking |url=https://www.theverge.com/report/695915/switch-2-usb-c-third-party-docks-dont-work-authentication-encryption |access-date=2025-08-13 |website=The Verge}}</ref> This behavior is not observed with most other USB docks, unless they have gotten around this encryption. | Sean Hollister, senior editor at the verge, tested these encryption methods. Using a diagnostic device, Hollister took note of the data being transferred between the Nintendo Switch 2 and the dock that comes with the console. He noticed that the 2 devices communicate and respond with eachother over 30 times before video output is confirmed.<ref>{{Cite web |last=Hollister |first=Sean |date=2025-07-02 |title=How Nintendo Locked down the switch 2's usb C port and broke third party docking |url=https://www.theverge.com/report/695915/switch-2-usb-c-third-party-docks-dont-work-authentication-encryption |access-date=2025-08-13 |website=The Verge}}</ref> This behavior is not observed with most other USB docks, unless they have gotten around this encryption. | ||