If Intel is involved...
Mohnzh
http://www.foxnews.com/story/0,2933,299021,00.html
...maybe we will get an anti-cheat system that actually works well. Maybe we should look for it in GW2?
...maybe we will get an anti-cheat system that actually works well. Maybe we should look for it in GW2?
Coridan
I read about this earlier today as well...sounds interesting....but i think it is a long ways off yet.
Str0b0
I wouldn't bet on it. there is always a way to exploit code. It's the nature of programming. It is impossible to program for every single instance. Eventually someone will figure out a way to get around any new anti-cheat measures and as soon as they plug that exploit another month will pass before someone figures out a way around the plug. Consign yourself to the reality of software. It can be hacked and no one can stop it from being hacked. The best they can do is try to hold it off for as long as possible.
On the flip side of that the more detailed and comprehensive the anti-cheat is the more man hours it costs to create and then you see an increase in game prices. It gets to the point where it isn't cost effective to prevent the cheating because you won't move enough units to offset the cost of creating the anti-cheat. Sorry man Intel or not that's life in the digital age.
On the flip side of that the more detailed and comprehensive the anti-cheat is the more man hours it costs to create and then you see an increase in game prices. It gets to the point where it isn't cost effective to prevent the cheating because you won't move enough units to offset the cost of creating the anti-cheat. Sorry man Intel or not that's life in the digital age.
Matfei
Im envisioning a system which looks for any changes in the game code at all (unofficial) even a texture transparency setting for see-thru walls in FPS games, to soemthing else, if a code has to be changed in any way, or linked to in an unofficial way (the devs would have to supply a anti-cheat company with the update details so the tracker can be updated) but if it finds any unofficial variation in code, it notifys the company of the erronous account and steps are taken...
Sure nothing perfect, but I think a constant file/code scanning system would work to some extent. Granted im not a coder or anything, its just an idea. Im not and expert on how code is handled etc.
Sure nothing perfect, but I think a constant file/code scanning system would work to some extent. Granted im not a coder or anything, its just an idea. Im not and expert on how code is handled etc.
Omega X
I smell ulterior motive. This is gonna be used for more than just cheating.
wilebill
Omega X, sometime ago I remember reading that the IRS was interested in online games, and environments like Second Life, because there was a lot of taxable income not being reported. Taxable income from sales of ingame gold or plat, items, and the like. Possibly, this is why Intel is now getting involved; then again this may have nothing to do with it.
Dr Strangelove
Thank god, because everyone knows punkbuster does a spot-on perfect job of preventing cheaters.
arcady
Got an alternate URL for that?
October Jade
Quote:
Originally Posted by arcady
Got an alternate URL for that?
|
I'm not terribly fond of it either, but at least this is text media. You don't have to hear anyone screaming the article at your face.
Mohnzh
Sorry, it's the only link I can find.
Wilebill, I think I also heard about the IRS getting interested in online games for the reasons you mentioned. A friend of mine showed me an article about a year ago in PCGamer (I think that was it) about just that.
Wilebill, I think I also heard about the IRS getting interested in online games for the reasons you mentioned. A friend of mine showed me an article about a year ago in PCGamer (I think that was it) about just that.
Lord Sojar
Pardon me, but this is my field of expertise. I will not let this happen so help me God... EVER. This type of direct hardware manipulation is a direct invasion of privacy. This could allow hackers to exploit the function, employing a very simple, yet effective form of key logging by simply assigning a value to each key and having the module detect yes or no to that value.
This had better not happen, or there will be federal lawsuits. It is the programmers duty to stop cheating, not the hardware manufacturers. Personally, this is just another ridiculous Intel PR stunt designed to make the common gamer feel comfortable in their office chair, but meanwhile, the implications this would create in regards to reverse engineering and module rewrites... UM NO.
This had better not happen, or there will be federal lawsuits. It is the programmers duty to stop cheating, not the hardware manufacturers. Personally, this is just another ridiculous Intel PR stunt designed to make the common gamer feel comfortable in their office chair, but meanwhile, the implications this would create in regards to reverse engineering and module rewrites... UM NO.
arcady
Quote:
Originally Posted by October Jade
Ah yes, San Franciscans are allergic to Fox News.
|
It may seem absurd to some, but I see no point in clicking on a link to a site with a track record of politicized fabrications and a history of inciting paranoia rather than reporting. Doesn't matter what side they take, if a broadcaster takes such extremes as the above one does, they aren't worth paying attention to even for things as banal as weather reports.
Muspellsheimr
The ONLY conceivable time this would be acceptable is assigned computers during a controlled environment tournament. Anything else, and it will have serious repercussions in regards to hacking and logging.
I would NEVER purchase such hardware, nor would nearly anyone else who understands it's possibilities, and I will actively promote boycotting any game that requires such hardware, as I suspect many others will as well.
I would NEVER purchase such hardware, nor would nearly anyone else who understands it's possibilities, and I will actively promote boycotting any game that requires such hardware, as I suspect many others will as well.
bilateralrope
Quote:
Originally Posted by Mohnzh
http://www.foxnews.com/story/0,2933,299021,00.html
...maybe we will get an anti-cheat system that actually works well. Maybe we should look for it in GW2? |
If you say there were others, you will need to provide proof of them.
Quote:
Originally Posted by Str0b0
I wouldn't bet on it. there is always a way to exploit code. It's the nature of programming. It is impossible to program for every single instance. Eventually someone will figure out a way to get around any new anti-cheat measures and as soon as they plug that exploit another month will pass before someone figures out a way around the plug. Consign yourself to the reality of software. It can be hacked and no one can stop it from being hacked. The best they can do is try to hold it off for as long as possible.
|
I've seen how bad the hacking was in Maple Story when I played it for a few weeks. After asking around I found that the main design flaw was that calculations that players would want to hack were being done clientside, where they were getting hacked.
Though to be fair the server side processing does make lag more noticeable. For instance think of any tricky "jumping puzzle" you have played, then throw in about 250ms of lag and tell me how much harder it would make things.
Quote:
On the flip side of that the more detailed and comprehensive the anti-cheat is the more man hours it costs to create and then you see an increase in game prices. It gets to the point where it isn't cost effective to prevent the cheating because you won't move enough units to offset the cost of creating the anti-cheat. Sorry man Intel or not that's life in the digital age. |
Lets take the example from the fox news article of saying you fired 100 shots when you only fired one:
- In a baldy designed system, the server takes this as a fact.
- In a server side system, the server checks to see if firing those 100 shots is even possible. If not, it only lets you fire one while ignoring the other fire commands. Or the command simply says "start firing" and you keep firing until either you say stop, or something prevents you from firing again (say, your target dies).
- In the system Fox is promoting, the game maker will need control of your computer down to the hardware level (say goodbye to running windows games on other operating systems) and have it report back to them. But if someone figures out what is being reported back and spoofs it, there goes the anti-hack system. Not to mention various legal issues of spying on peoples computers.
Lets say someone uses this system for hack prevention, but the spyware module isn't on all computers. This means that either they lock out a portion of their market, or they have "trusted" and "untrusted" players. So the "trusted" players will be under less monitoring (if you aren't going to treat them differently, why have the chip ?). So when one of them does hack things, they will take longer to spot than if they were in the trusted group.
bilateralrope
Quote:
Originally Posted by Muspellsheimr
The ONLY conceivable time this would be acceptable is assigned computers during a controlled environment tournament. Anything else, and it will have serious repercussions in regards to hacking and logging.
|
So basically I'd have the computer locked in a box with holes in it for the cables.
Mohnzh
bilateralrope,
I dont think this is geared towards exploiting code bugs, per se. I think itis more generalized than that. Hopefully it will be something that can detect and prevent botting and other forms of "cheating". I tend to suspect whether or not the ideas can be implemented legally. But I cannot support the reporters choice to speculate that some companies do not talk about their anti-cheat technology because it probably violates certain Californian laws.
I dont think this is geared towards exploiting code bugs, per se. I think itis more generalized than that. Hopefully it will be something that can detect and prevent botting and other forms of "cheating". I tend to suspect whether or not the ideas can be implemented legally. But I cannot support the reporters choice to speculate that some companies do not talk about their anti-cheat technology because it probably violates certain Californian laws.
sindex
I still am questioning why Intel bought Havok. Nevertheless I like Intel, but the whole big brother thing kind of creep’s me out. You have to understand there will always be a flaw in the system that can be eventually be exploited. I know the battle still rages with security systems/programs against identity theft, computer viruses, and other technical malicious stuff. What makes you think any of this will go away in the future?
immortius
I'ld have to agree that Guild Wars doesn't need any sort of client-side cheat detection - it is too well designed to need it. The netcode found in Korean MMORPGs makes me cry, and I'ld prefer they fixed it rather than rely on external cheat detection systems.
The Intel anti-cheating system is more likely to be aiming to stop wall-hacks and aim bots in FPSes than anything else, as those are unavoidable holes client-side. And by its Intel nature it will necessarily be optional, as any AMD user will be unable to use it.
The Intel anti-cheating system is more likely to be aiming to stop wall-hacks and aim bots in FPSes than anything else, as those are unavoidable holes client-side. And by its Intel nature it will necessarily be optional, as any AMD user will be unable to use it.
$neekie
Quote:
Originally Posted by Rahja the Thief
Pardon me, but this is my field of expertise. I will not let this happen so help me God... EVER. This type of direct hardware manipulation is a direct invasion of privacy. This could allow hackers to exploit the function, employing a very simple, yet effective form of key logging by simply assigning a value to each key and having the module detect yes or no to that value.
This had better not happen, or there will be federal lawsuits. It is the programmers duty to stop cheating, not the hardware manufacturers. Personally, this is just another ridiculous Intel PR stunt designed to make the common gamer feel comfortable in their office chair, but meanwhile, the implications this would create in regards to reverse engineering and module rewrites... UM NO. |
BF2142 has a tracking system to, to check how much the players look at the ing add(wich are changeble). It has nothing to do with cheating, but they still look at what your doing. Killing this proces will crash your game...
I dont like these things, but i welcome some active cheater defence(pb is phew phew). I did a lot of research into BF2 cheats, macro use(just as bad as cheats and non detectable) and how PB isnt able to catch up, the cheaters that get cought often get couhgt by admins using PB screenies(investing time to look all of them over) and getting there server streamed by Punksbusted and the masterban list, what does dice/ea do with the official reports..................nothing because they dont accept pb screenies,WTF!
I quit bf2 because of this crap, there are even name spoof cheats(wich got some top 10 players reset) Cheat companies garantee, that you dont get cought, if you do they give you a new game key. But hey the game is 2 years old why support it anymore..............crappy EA.
Sry for the rant, but i really loved bf2 and its mods. Its frustrating to see the game go down. I for 1 would welcome better anti cheat software, or rather see it incoded(dont know if thats possible) in the game, plus i h8 to say it(i love the mods) but companies should stop giving out mod tools. And better protect there games(leggaly), ea isnt able to even sue the cheat companies(dont ask me why, country problem maybe?).
Online games are getting bigger and bigger, about time somebody actually did something about cheaters and autokeybind/macro use(make some clear rules). For all game types and how i dunno, i wouldent mind the spyware(its in alot of games already) Again sry for the rant....
mzzls
bamm bamm bamm
Quote:
Originally Posted by immortius
And by its Intel nature it will necessarily be optional, as any AMD user will be unable to use it.
|
zwei2stein
Quote:
Originally Posted by Omega X
I smell ulterior motive. This is gonna be used for more than just cheating.
|
http://www.gnu.org/philosophy/can-you-trust.html
Any MMO game can (and should be) designed in a way that makes client-side tampering impossible.
Presearing exploit is example where anet developers messed up and added functionality supposed to be in server to client. Long time ago, regen/degen was handled client side, resulting in ludicrous godmode cheats.
Stuff like duping was server side error, and that intel thingie would have done NOTHING against that.
So, local anticheat = fail.
Fril Estelin
Quote:
Originally Posted by bamm bamm bamm
Well, AMD are a founding member of the Trusted Computing Group, so I wouldn't be too sure.
|
This measures are perfectly normal. Security was, is and always will be an arms race. Companies propose security systems (I would agree that TC is a much more sensitive technology than AV and FW) and hackers (bear in mind, now they no longer do it for the fun or reputation, we're talking millions in real money here, with links with mafia and other traffics) push through it, which force companies to fix until a certain point where they have to move to the next security paradigms.
I guess everyone would agree that when TJX's laptop were stollen and many customer information were available to hackers, fixing this issue would be welcome, right? Well, to fix this, you have to encrypt, and to make encryption work, you have to protect the key, and there are NO completely secure way to do that. Until you add hardware control (policy enforcement), which the most difficult and costly way to break (the hacker has to physically get at your computer, much more difficult than sending a trojan, isn't it?).
And since the gaming industry is the biggest one (more than movie and music, which makes people's scare about DRM very relative!), you can expect something big to happen here. I know that Intel's proposals in the last 2 years have been rejected due to their high cost (change in the way PCI works), but they are finding new innovative ways to improve the situation.
As can be seen from the /report system in GW, such features will be received by people shouting messages of "we're doomed" and "it won't work". Until they start to see it works. Which does not mean that this one will work, but at least they try. And if you have a BETTER solution, please apply for a job at Intel. If it's really better, you'll get a very well paid job!
shirosae
So this is how Intel are going to push their hardware DRM?
Fril Estelin
Quote:
Originally Posted by zwei2stein
|
http://en.wikipedia.org/wiki/Trusted_computing
They even have a nice video for those who think that a complicated technology can be summarised with a nice video.
Most of this stuff has been debunked in the scientific community, has been implemented by companies and is currently rolled out in the business world (where the highest loss are seen, see health and banking records being stollen).
Quote:
Any MMO game can (and should be) designed in a way that makes client-side tampering impossible. |
What scares people is that the same technology that can be used to prevent cheating (well, it's all relative, people can still create scams and phishing, but this is a social engineering attack on the persons, not the computer) can also be used to enforce DRM. And then no more free games, videos and music.
Fril Estelin
Quote:
Originally Posted by shirosae
So this is how Intel are going to push their hardware DRM?
|
(something tells me I'm going to have a very hard time fighting the wrong ideas here ... please read all my messages before you post a reply, thanks!)
SotiCoto
Quote:
Originally Posted by shirosae
So this is how Intel are going to push their hardware DRM?
|
Take me back to the old PSO way any day.
I doubt I would have enjoyed PSO as much if it hadn't been hacked to hell and back. Sega unfortunately didn't like it much.... but it did make the game more interesting. Plus there was a sense of satisfaction to teaching those without the hack-disks to exploit glitches in the game in order to defend themselves against the hackers.
It was the kind of anarchy I can only dream of these days.... but it worked wonders.
zwei2stein
Quote:
Originally Posted by Fril Estelin
Totally true. And totally impossible today, because all software is breakable. Any solid programmer knows that. You can most of the time design the software so that exploits don't lead to problems (WTF, seriosly, WTF), but for any relatively complex software, this is not true. So you have to introduce an element of hardware, which makes it more difficult (since you have to have physical access).
|
---
ASAP programer tries to weasel out from making mess by claiming that mistakes are inevitable, its time to fire him on spot.
Amount of possible attacks on software is finite. All it takes is decent data entry filter and bam! Inpenetrable software. OFC, this is simple model. Its not cheap or anything, but guess what? If you dont do it, security chip wont save your ass because it can do nothing about rogue systems.
Its time for you to call buddies that work for banks. Believe me, they know better than "we cant fix all holes, yadada yadada".
Also, you really cant believe that DRM can be saved by that chip. Its defective by design: For enuser to access content, he must have key, sw to decrypt AND ciphertext. You can make it complicated, but you can never get around this simple fact.
FYI, before you start with "you have no idea..."... I work as software consultant. For banks.
Fril Estelin
Quote:
Originally Posted by zwei2stein
Amount of possible attacks on software is finite. All it takes is decent data entry filter and bam! Inpenetrable software. OFC, this is simple model. Its not cheap or anything, but guess what? If you dont do it, security chip wont save your ass because it can do nothing about rogue systems.
|
http://cm.bell-labs.com/who/ken/trust.html
Quote:
Its time for you to call buddies that work for banks. Believe me, they know better than "we cant fix all holes, yadada yadada". |
BTW, do you know the only OS that have a CC EAL4?
Quote:
Also, you really cant believe that DRM can be saved by that chip. Its defective by design: For enuser to access content, he must have key, sw to decrypt AND ciphertext. You can make it complicated, but you can never get around this simple fact. |
Quote:
FYI, before you start with "you have no idea..."... I work as software consultant. For banks. |
(I taught software engineering in 1st year of a computing science university, we teach such things; I'm also working on formal methods, the only thing you could call close to safe computing in SE, look at EAL7 ...)
shirosae
Quote:
Originally Posted by Fril Estelin
Intel develops the platform, not the application. It's like blaming the car companies for the way people drive their car. (or more precisely for the government's highway code...)
(something tells me I'm going to have a very hard time fighting the wrong ideas here ... please read all my messages before you post a reply, thanks!) |
Also, Intel specifically made mention of it as usable as hardware DRM back four and a bit years ago when the project was kinda widely picked up by the internet, and again highlighted when Apple announced it was going to start using Intel chips.
There are a ton of google entries dated around 2004-2005 which clearly show Intel trying not to say what the hardware was supposed to do, before admitting that it was 'forward-looking DRM'.
If Intel want to argue now that the direction of the project has changed, fine. But DRM was one of the fundamental purposes of that technology. I would be very surprised if it wasn't destined to end up being used in this fashion.
bamm bamm bamm
Quote:
Originally Posted by Fril Estelin
snip
|
Str0b0
Hardware or not it's still not going to work. Even if the majority of the code is kept server side all someone has to do is find the code that tells the bits of hardware on your end to report to the server. In other words you have program A sitting on a computer telling server B anything that is out of the ordinary. This means the actual monitoring is done client side but reported server side.
They already have this in network security. It's just a behavioral monitoring program put on a chip and it can be defeated. All you have to do is gather a baseline set of readings for normal operation and basically have another program report those to the reporting software while you do whatever you like. to that end you don't even need to know the server side code. All you need to know is the client side code and the normal parameters it checks for, which would also be in the codebase. Then you can design a program that does nothing but lie to the reporting software causing it to send false reports to the server.
The PoC of this has been around for over a year now. It's a simple macro virus that uses Excel features to attack your computer. It slipped past Symantec security and behavioral monitoring software because it was designed to search for and lie to those programs. It did it rather elegantly by taking a digital "snap shot" of the operating system at the moment of installation. It then fed those values to the behavioral monitoring software over and over and over again while it opened up excel and made your computer do bad things. Security software didn't know any better because the virus was sending it data that said everything was functioning normally.
They already have this in network security. It's just a behavioral monitoring program put on a chip and it can be defeated. All you have to do is gather a baseline set of readings for normal operation and basically have another program report those to the reporting software while you do whatever you like. to that end you don't even need to know the server side code. All you need to know is the client side code and the normal parameters it checks for, which would also be in the codebase. Then you can design a program that does nothing but lie to the reporting software causing it to send false reports to the server.
The PoC of this has been around for over a year now. It's a simple macro virus that uses Excel features to attack your computer. It slipped past Symantec security and behavioral monitoring software because it was designed to search for and lie to those programs. It did it rather elegantly by taking a digital "snap shot" of the operating system at the moment of installation. It then fed those values to the behavioral monitoring software over and over and over again while it opened up excel and made your computer do bad things. Security software didn't know any better because the virus was sending it data that said everything was functioning normally.
EternalTempest
Quote:
Originally Posted by Omega X
I smell ulterior motive. This is gonna be used for more than just cheating.
|
The more that "hardware" does things like scan / check stuff or ... it can check for "unlicensed media files or pirated media files and notfiy X" at the hardware level, this should really be controlled at the software level.
The problem is you can have a "box" that between keyboard and usb/ps2 port that can use macro's to simluate keyboard strokes that pc will not be able to detect. Then they can use the arugment must come up with a "standard" to encrypt keyboard to pc communcation... which could also be broken.
Build a better mouse trap, get better mice.
zwei2stein
Quote:
Originally Posted by Fril Estelin
Did you write a compiler? A library linker? Part of an OS kernel? Hardware firmware? (hint: that's roughly the chain of controls that you need to control in SW) I will leave you with this classic paper, before we delve deeper into the madness:
http://cm.bell-labs.com/who/ken/trust.html |
Were talking service, with well defined API and input. There, your attacks are injection ... or injection.
Quote:
You've heard of phishing attacks? And server DDoS? Guess who they target? BTW, do you know the only OS that have a CC EAL4? |
how does phishing come to this debate, but whever.
z/OS V1R8 for example? Is this googling contest anyway? Some linux distros aim for L5 btw.
EAL7 is possible. Not worth required money for public sector.
Quote:
Yep, unless it's done in hardware. Then you have to open the TPM to see they key. And I wish you good luck with that (You'll be billionaire in months if you succeed). |
HW still needs key inside, still needs it processed, and is prone to tampering.
But whatever.
Fril Estelin
Quote:
Originally Posted by bamm bamm bamm
I'm already aware of all of this. I just said AMD are unlikely to be exempt. Where do you get off telling people to 'educate themselves'?
|
Fril Estelin
Quote:
Originally Posted by Str0b0
Hardware or not it's still not going to work. Even if the majority of the code is kept server side all someone has to do is find the code that tells the bits of hardware on your end to report to the server. In other words you have program A sitting on a computer telling server B anything that is out of the ordinary. This means the actual monitoring is done client side but reported server side.
They already have this in network security. It's just a behavioral monitoring program put on a chip and it can be defeated. All you have to do is gather a baseline set of readings for normal operation and basically have another program report those to the reporting software while you do whatever you like. to that end you don't even need to know the server side code. All you need to know is the client side code and the normal parameters it checks for, which would also be in the codebase. Then you can design a program that does nothing but lie to the reporting software causing it to send false reports to the server. The PoC of this has been around for over a year now. It's a simple macro virus that uses Excel features to attack your computer. It slipped past Symantec security and behavioral monitoring software because it was designed to search for and lie to those programs. It did it rather elegantly by taking a digital "snap shot" of the operating system at the moment of installation. It then fed those values to the behavioral monitoring software over and over and over again while it opened up excel and made your computer do bad things. Security software didn't know any better because the virus was sending it data that said everything was functioning normally. |
This is NOT, to my knowledge, the way they plan to implement it. Just one possible scenario.
Chthon
Quote:
Originally Posted by Omega X
I smell ulterior motive.
|
At any rate, such a system would be easily defeated by a hardware dongle. It's not like we haven't had third-party hardware devices to spoof user input since the first "turbo" controller for the NES or anything....
If you wanted to get really fancy, you could give your dongle an additional USB connector and feed it the (complex, situation-dependent) output from a macro to feed back into the keyboard input.
Moreover, the unit is going to need a driver, either in windows or in firmware, which leaves open the possibility of disabling it with a "patched" driver.
So...
Quote:
Originally Posted by zwei2stein
So, local anticheat = fail.
|
While their implementation isn't always perfect, a-net's anti-cheating philosophy is -- Presume the client is infinitely hackable; Move everything that isn't "mere I/O" to the server; Make sure your input is coming from the right user (session encryption ftw); Sanity check you input (The pistol-turned-machine gun in the FoxNews <shudders with disgust> report could be easily dealt with by implementing a max refire rate for the gun.. duh...); And don't send any output to the client that you don't want the user to know (D2 maphack ftw).
Fril Estelin
Quote:
Originally Posted by zwei2stein
server DDoS is problem, yes, but how would your chip help? It can be remedied by identifiying attacker before its too late, help a bit against swarm.
|
Quote:
how does phishing come to this debate, but whever. |
Quote:
HW still needs key inside, still needs it processed, and is prone to tampering. |
zwei2stein
Quote:
Originally Posted by Fril Estelin
Ever heard of whitelists?
|
Quote:
Go ask the banks . Impenetrable SW does not exist in any way. You' have a good example of why in Ken Thomson's paper. Or when you realise that any SW runs on the processor, which the SW has no control over. |
Point here is that you can not make software secure if there is physical access to machine which runs it (that procesor of yours helps, but does not stop it.).
But you can secure remote server enough to be inpenetrable /unless you got some social engineering going on, but nothing expect common sense helps against that./.
Quote:
Maybe if you're the chip maker. The big guns in the business already started trying to break it, without the hind of a chance. Furthermore, thanks to a clever design, if you succeed in opening your TPM, you'll only get keys for your platform, which are different from anyone else's. |
nightwatchman
The problem with this sort of thing is that we're going to get into a situation where Guildwars (etc) only runs on PCs with all the latest "trust" hardware from a "trusted" group of hardware vendors all of which probably charge a premium.
If you've got a PC thats a couple of years old, or if you don't want to pay for trust hardware you'll be flagged as a likely hacker, or banned from playing at all.
If MMOs think they have to rely on these sort of things, they should just do everyone a favor and run on consoles instead.
If you've got a PC thats a couple of years old, or if you don't want to pay for trust hardware you'll be flagged as a likely hacker, or banned from playing at all.
If MMOs think they have to rely on these sort of things, they should just do everyone a favor and run on consoles instead.
Fril Estelin
Quote:
Originally Posted by nightwatchman
The problem with this sort of thing is that we're going to get into a situation where Guildwars (etc) only runs on PCs with all the latest "trust" hardware from a "trusted" group of hardware vendors all of which probably charge a premium.
If you've got a PC thats a couple of years old, or if you don't want to pay for trust hardware you'll be flagged as a likely hacker, or banned from playing at all. If MMOs think they have to rely on these sort of things, they should just do everyone a favor and run on consoles instead. |
This thread reminds me of the one on the /report feature. The only vocal people are the ones complaining, and sometimes whining (those that can no longer play nasty and get pleasure from annoying other people). The ones that have no problem with the system don't talk.