Quote:
Originally Posted by Feathermoore Rep
Thats the point by not giving out their hand, the programmers are constantly on their heels because of the fact that aNet could know about new methods tested as well as the popular methods. Its about wasting their time and slowing them down, you'll never completely stop them. But this will slow them down. You stop murders by arresting people, who have generally done something (or been framed for it :-p). You then have to prove your innocence. P
|
As much as I would like to entertain a proper argument right now (I can't formulate it), I will say this: The programmers should be on their heels regardless of whether they've been using a method they released 5 months ago or just last night. Methods become out-dated with time. That's a simple fact.
Quote:
Originally Posted by cormac ap dunn
I believe that you are intelligent enough to get that the specific bots used would not HELP anyone in a positive way in the community by being revealed. This is no trial, Anet is both judge and jury and Dhuum was the executioner. the details of the bans are not for the community to know at this time by their choice, we can huff and puff and attack and point as many fingers as we like, but in the end, they can do as they please with the information.
|
To clarify: I would like to know
how they sniffed out people who botted. On the surface, it just looks like they checked for injected .dlls. All I want is a confirmation or denial of that. And none of that "We can neither confirm nor deny that we used that method" rubbish.
ArenaNet is entitled to do mostly whatever they want. The fact that they can do things doesn't bother me. I'd like to know how they did it, and in some cases why they did it. I ask this about anyone or anything I see, in which I see it do something of which I am not familiar. Banning bots is very familiar to me, as well as the justification. What I want to know is
how.
Whether programmers analyze enough of what happened and make several well-educated guesses, or the method of detecting illegal third-party modifications is published in a textbook about networking, at some point that knowledge will become available.