Bambu Lab is abusing the open source social contract
Bambu cloud, plugins, and OrcaSlicer fork
- Bambu’s slicer is AGPL and downloads a closed-source “network connector” plugin that talks to Bambu’s cloud.
- A fork (of OrcaSlicer, itself a fork of Bambu’s slicer) reimplemented or reused the cloud connector interface and spoofed the official User-Agent to regain cloud-mediated “local print” features after recent firmware/auth changes.
- Bambu responded with legal threats and framing this as “impersonation” and a security issue; many commenters see this as bullying an OSS dev rather than fixing their own auth design.
Open source licensing and legal angles
- Several argue Bambu is violating the spirit or letter of AGPL by:
- Using a closed plugin tightly coupled to AGPL code.
- Discouraging or threatening modification and use of their own AGPL’d client.
- Others counter that:
- AGPL covers the client code, not the right to access Bambu’s servers.
- A user agreement can still restrict which clients may use the cloud.
- There’s debate over whether UA-based “authorization” and bypassing it could trigger CFAA/“unauthorized access,” with no clear consensus.
Privacy, security, and state-actor worries
- Many are uneasy that prints and control commands can flow through Bambu’s cloud, especially for professional or sensitive work.
- Some suspect Chinese state pressure or data-mining (e.g., drone parts, IP leakage), others call this speculative or conspiracy-tinged.
- Even critics note that LAN and SD-card modes exist, but newer firmware intertwines auth with the cloud and “developer mode,” weakening local-only stories.
User experience and alternatives
- Bambu hardware is widely praised: “just works,” fast, high quality; often compared to the “iPhone of 3D printers.”
- Several say this ease is why they bought Bambu despite misgivings; others now vow never to buy from them or to keep existing machines but not upgrade.
- Alternatives discussed include Prusa (more open, more expensive, now with its own more restrictive hardware license), Qidi, Elegoo Centauri Carbon, Creality K-series, Anycubic Kobra, Voron/toolchangers, Snapmaker, and others, each with trade-offs in openness, reliability, and price.
Remote printing, fire risk, and cloud-first IoT
- Strong split on unattended/remote printing: some do it routinely, others consider it reckless due to fire risk and insurance concerns.
- Broader frustration with “cloud-first” IoT: centralized services become chokepoints, enable lock-in, and can be changed post-sale, yet they’re often the only way non-technical users get remote access working.