eyeon

joined 11 months ago
[–] eyeon 1 points 1 week ago

I hope they find a way to add more variety to the gameplay interactions. Not just having a variety of builds that work though that's important too. but it feels like no matter what your build is you then have the same approach to all encounters. There's lots of different mob types and random modifiers on them but either it breaks your build and you can't clear them..or you clear them the same way you clear everything else.

[–] eyeon 6 points 1 week ago

And for context, it does this because cheaters are willing to run cheats that run at that kernel level, and the only way to detect and prevent them is if the anticheat is in your kernel first.

[–] eyeon 2 points 1 week ago

Correct, though to be pedantic anyone can be a CA- you just generate a cert with the right bits to say it's a ca certificate and then use it to sign any other certificate you want.

But the only devices that will consider your signature worth anything are ones you also install your ca certificate on. So it's useful and common in internal networks but isn't really what is being asked here.

The hard part is getting in the root CA store of operating systems and browsers. As far as I know they are all maintained independently with their own requirements.

[–] eyeon 16 points 2 weeks ago (1 children)

i am not making shit up, I promise I've ran many game servers over the years. I am obviously generalizing as of course there are counter examples especially MMOs.

But then there is warcraft 1 through 3 that were peer to peer and quake, half life, unreal, painkiller, enemy territory, and just about every fps game of the era that came with the software to run your own dedicated server, or could host a listen server while playing.

If you want to just look at a single very mainstream example, look at call of duty. Everything up to and including cod4:mw came with the software to run your own server. nothing after it did, though a few let you 'run your own server' by paying their approved hosting provider to run a copy for you, but it was always under their control and not something you could just set up on hardware you already have.

[–] eyeon 26 points 2 weeks ago (4 children)

i think the simplest explanation is this:

If your game requires a server component to be played, let players run the server. Ideally from day 1, but at least as part of shutting down your game.

it's really not hard, that's how multi-player games worked until lootboxes took off and replaced modding.

[–] eyeon 2 points 2 weeks ago (1 children)

it's frustrating that people react and spread misinformation without doing the bare minimum of research, but I don't think making obvious satire is frustrating. if anything hopefully people learn from it and stop taking screenshots of things as truths

[–] eyeon 4 points 2 weeks ago

i didn't downvote but imo it is light on data. having some more info on methodology would help, like where did the data come from? was there any normalization or other processes?

It's hard to know if this is a map of words used most in an area relative to how little it's used elsewhere, or just most common? or just..cherry picking slang that isn't actually commonly used but is from that area?

[–] eyeon 5 points 3 weeks ago

Or you'll see something equally efficient and equally performing at the same power levels..except you'll see newer gens or upgraded skus allowed to pull more power

[–] eyeon 6 points 3 weeks ago (1 children)

another useful one is <(cmd here)

It's like $(cmd here) but instead of returning the output of the command as a string passed into the arguments, it makes a new file descriptor for the output of the command and returns the path to it, for use in commands that want a file as an argument.

So for example if you want to use diff to compare your local passwd file to a remote one..

diff -u <(ssh host1 cat /etc/passwd) /etc/passwd

Admittedly I can't think of many things I've used this for outside of diff and alternatives to diff..but I've used it there a lot, like comparing the results of running two slightly different queries.

[–] eyeon 12 points 3 weeks ago (4 children)

All I can think of are some variations of you trusting a service to validate your id and give you a token that just asserts your id has been validated.

But it's still not really privacy preserving because it relies on trusting both parties to not collaborate against your privacy. if at some point the id provider decides to start keeping records of what tokens were generated from your id, and the service provider tracking what was consumes with that token, then you can still put it all back together.

[–] eyeon 10 points 1 month ago

then I would install one

[–] eyeon 37 points 1 month ago (3 children)

Isn't the last version already that..well..last version?

If anything they could just leverage their work with proton that allows steam to play windows games on Linux to provide similar compatibility shims for old windows on modern windows

view more: next ›