The Amiga was a great game system in its day, but there were some titles it was just never going to get. Sonic the Hedgehog was one of themβ SEGA would never in a million years been willing to port its flagship platformer to another system. Well, SEGA might not in a million years, but [reassembler] has started that process after only thirty four.
Both the SEGA Mega Drive (thatβs the Genesis for North Americans) and Amiga have Motorola 68k processors, but that doesnβt mean you can run code from one on the other: the memory maps donβt match, and the way graphics are handled is completely different. The SEGA console uses so-called βchunkyβ graphics, which is how we do it today. Amiga, on the other hand, is all about the bitplanes; thatβs why it didnβt get a DOOM port back in the day, which may-or-may not be what killed the platform.
In this first video of what promises to be a series, [reassembler] takes us through his process of migrating code from the Mega Drive to Amiga, starting specifically with the SEGA loading screen animation, with a preview of the rest of the work to come. While watching someone wrestle with 68k assembler is always interesting, the automation heβs building up to do it with python is the real star here. Once this port is done, that toolkit should really grease the wheels of bringing other Mega Drive titles over.
It should be noted that since the Mega Drive was a 64 colour machine, [reassembler] is targeting the A1200 for his Sonic port, at least to start. He plans to reprocess the graphics for a smaller-palette A500 version once thatβs done. Thatβs good, because it would be a bit odd to have a DOOM-clone for the A500 while being told a platformer like Sonic is too much to ask. If anyone can be trusted to pull this project off, itβs [reassembler], whose OutRun: Amiga Edition is legendary in the retro world, even if we seem to have missed covering it.
A suspected British hacker linked to one of the largest single Bitcoin thefts ever recorded may have been detained in Dubai, according to claims made Friday by on-chain investigator ZachXBT.
In a post shared on his Telegram channel on December 5, ZachXBT said a man known online as βDannyβ or βMeech,β identified as Danish Zulfiqar, appears to have been taken into custody by authorities, with a portion of the stolen crypto allegedly seized.
He pointed to roughly $18.58 million in digital assets now held in a single Ethereum wallet that he says is connected to the suspect.
ZachXBT noted that several wallets previously tied to the alleged hacker had funneled funds into the same address in a pattern commonly seen during law enforcement seizures.
He also claimed Zulfiqar was last known to be in Dubai, where a villa was reportedly raided.
Authorities Silent as Reports Surface of Possible Arrest in $243M Bitcoin Hack
According to the investigator, others linked to the suspect have also gone silent in recent days.
So far, there has been no official confirmation from Dubai Police or UAE authorities regarding any arrest, asset seizure, or raid connected to the case.
Local media outlets in the region have also not verified the claims.
The possible arrest follows months of investigation into the August 19, 2024, theft of 4,064 Bitcoin, worth about $243 million at the time. The funds were taken from a single Genesis creditor who accessed assets through Gemini.
ZachXBT made the case public in September, alleging the theft was carried out through a coordinated social engineering attack.
According to his findings, the attackers posed as Google support staff and convinced the victim to reset two-factor authentication.
They then used remote access software to take control of the account. After extracting the private keys, the attackers drained the wallet and moved the Bitcoin through a web of exchanges and swap services in an attempt to launder the funds.
ZachXBT initially tied the attack to three online aliases, βGreavys,β βWiz,β and βBoxβ, later naming Malone Lam, Veer Chetal, and Jeandiel Serrano as the people behind those accounts.
He said his findings were shared with law enforcement authorities.
U.S. Charges, UK Guilty Plea, Thailand Arrest Mark New Phase of Crypto Crime Probes
U.S. prosecutors later filed criminal cases connected to related activity. In September 2024, the Department of Justice charged two suspects in a $230 million crypto fraud scheme.
Broader racketeering charges later described an operation totaling more than $263 million, including the Genesis-linked Bitcoin theft. Court documents outlined a mix of SIM swaps, social engineering tactics, and even physical burglaries.
Prosecutors said the stolen funds were spent on high-end cars, travel, and nightlife. One of the defendants, Veer Chetal, was later accused of carrying out another $2 million crypto theft while out on bond.
ZachXBT has also connected Zulfiqar to the August 2023 Kroll SIM swap incident, which exposed the personal data of creditors tied to BlockFi, Genesis, and FTX.
That breach later played a role in more than $300 million worth of crypto thefts through follow-up phishing and impersonation schemes.
The reported Dubai development comes as crypto-related law enforcement activity continues to pick up worldwide.
Thai police arrest alleged FINTOCH mastermind behind $31 million crypto Ponzi scheme that defrauded investors across multiple Asian countries.#Thailand#Policehttps://t.co/Mccq2KpZfb
In the UK, authorities recently secured a guilty plea from Zhimin Qian in a case tied to what officials described as the largest crypto seizure in history, involving more than $6.7 billion in Bitcoin.
Outside of investigations, ZachXBT has also remained active in public disputes.