MelonDS, a Nintendo DS emulator, is now available in beta version for Android

MelonDS, a Nintendo DS emulator, is now available in beta version for Android

It's been a while since the Nintendo DS was released in 2004. And since then, many emulators have made their way to the same thing. Some of them were also countered by Nintendo. A new emulator for Android called MelonDS is now available in Beta version 1.0.0. The new MelonDS developers mention that the emulator's feature set and performance are now in an acceptable state, so the beta version is up for download. This was announced in a Reddit post, which also mentions that important features are still missing from a proper release.

MelonDS Change record

- Use melonDS 0.9.1 as a base - DSi support (you will need your BIOS, firmware and NAND files) - JIT support (on 64-bit devices, which should bring significant performance benefits) - Threaded rendering (brings considerable performance improvements ) - Improved audio quality (or maybe it's all placebo. You tell me) - External storage support (I couldn't test this thoroughly. Let me know if there are any issues) - Microphone input support (microphone will always listen when you play. Will optionally add a switch) - Minor bug fixes

Problem with unauthorized Android emulators

In a previous report, we explained how researchers identified a litany of rogue Android apps in circulation, with millions of collective downloads, many of which play on gaming-related themes. According to security firm White Ops, a selection of more than 240 Android apps have engaged in deceptive behavior using out-of-context (OOC) ads, designed to mimic those that might be served by popular platforms like YouTube. . Often these highly attractive applications have taken the form of Nintendo Entertainment System (NES) emulators, allowing nostalgic Android users to play retro video games from the late 80s, such as Super Mario Bros. What makes Operation RAINBOWMIX What's unusual, according to White Ops, is the effort that has gone into ensuring that apps work at least partially as advertised (increasing the likelihood that a user will return) and the ease with which many of them ended up on Google. Play store. To circumvent the various security protocols that protect against rogueware, applications have used a relatively unsophisticated technique involving packers, described as "software hiding a trailing payload." “The code responsible for out-of-context ads is found in packages owned by legitimate SDKs, such as Unity and Android. All discovered apps seem to have rather low detection rates in antivirus engines, largely due to the packer. However, the company was careful to note that its investigation did not detect any fraud directly related to the legitimate SDKs referenced.