Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)CS
Posts
3
Comments
392
Joined
2 yr. ago

  • Wondering how will F2P games with anti-cheat react to the news. Knowing that much of their player base may jump ship to Linux to avoid the subscription fees, will they relent and start using less invasive anti-cheat programs, or will they try to adapt specific versions of Wine / Proton to work in rooted mode?

  • Genshin being paid by Apple to withhold 120 FPS from other devices (and controller support from other mobile devices), plus their invasive anti-cheat, plus the fact that Mihoyo is a Chinese company (which makes the aforementioned anti-cheat even more scary to touch) makes me not want to touch the game with a ten-mile pole.

  • Not only have I cancelled them almost a decade ago - I don't even watch series or movies anymore, and barely listen to music outside of the radio. I'm disgusted with the many crimes committed by Big Media and want to have as little as possible to do with it.

  • While I'm not entirely sure about this reasoning, it might be related to the status of soy as a meat and milk substitute. Omnivores claiming that "soy is not meant for human consumption in the same way that milk and meat are" must have eventually been shortened along the way as "soy is not meant for human consumption".

  • Because by doing so, law enforcement can manipulate the image from the source by:

    • Intercepting the payload and modifying the operative system to send data to law enforcement
    • Pose as the origin of the original payload, and send the tainted operative system to other devices when they reboot

    Unless, of course, the BIOS stores the checksum of the untainted image. (Which adds its own can of worms, because that would make legitimate image upgrades require writing the new proper checksum on each server)

  • Because by knowing which IP is the boot image stored from, law enforcement can locate the source of the unencrypted image, thus making the scheme lose its privacy. The only way to bypass the issue is by manually configuring the IP after every reboot and keeping it a secret.