Jump to content
SSForum.net is back!

Mr Ekted

Member
  • Posts

    356
  • Joined

  • Last visited

Everything posted by Mr Ekted

  1. Yawn.
  2. There's a suggestion in Cont database, for Powerball, for an arena setting to force specs to spectate the ball. This way they can't pan around map to look ahead where the defense is, etc.
  3. We were discussing Smong's question about including ASSS encryption, which is going to be open source, in a client. And SOS and I were telling him that the encryption algorithm does not exist in the server. We are not currently discussing the concept, as you seem to be dwelling on, that the entire game of Subspace is so incredibly insecure that we might as well pack it up. No one agrees with you, except maybe Gravitron, and we have learned to ignore him as well. Yes, given enough time, anything can be cracked. That doesn't mean it will be cracked. That doesn't mean we should stop playing.
  4. Yes, without plugins powerbot does virtually nothing.
  5. There are still things that have to happen first that are out of my control. FYI, a public release does not imply open source.
  6. Well I !@#$%^&*umed your code was for MERV and just modifed it accordingly. Powerbot has x and y pixel locations for a player, but not redundant crap like tile locations.
  7. It's obvious you are not listening to me. I keep on telling you why doing X is bad, and you keep on saying "Hey! Why don't we do X!"
  8. I thought you were done reading this board. If not, why make a meaningless post like this?
  9. Two things: 1. You can do p->deaths++ to increment by 1. This is very useful for readability and to avoid typos in longer expressions like: alongptrname->alongarrayname[alongvarname].alongmembername = alongptrname->alongarrayname[alongvarname].longmembername + 1; 2. If you send a player a single *spec, they are locked in spec until they quit and come back. If your arena is locked for the duration of the game, you should probably send *spec twice when you spec them. That will put them in spec, but unlock them.
  10. It's called programming in C.
  11. That's what I said...the algorithm. Making the keystream is the only important thing.
  12. if (p->tile.x >= 500 && p->tile.x <= 600 && p->tile.y >= 500 && p->tile.y <= 600) sendPrivate(p, "*warpto 433 282"); This checks if the position is in the rect 500,500 to 600,600.
  13. The encryption algorithm does not exist insdie the server code, only inside the client.
  14. Anything *can* be done. But allowing players to modify ANY part of the client allows them to have their code running inside the process space, which creates a less secure client. The security aspects of the client are not just encryption. They also protect against examination/modification of sensitive data. The protection schemes used sort of wrap the entire client in various ways. Giving out source code plus a security library means undoing almost ALL of Cont's protection.
  15. I believe that is how you would do it in MERV, yes.
  16. To open all doors, the command is ?set Door:DoorMode=0
  17. Let's talk about this from a network point of view. When all is said and done, all data/files are send across the internet from one computer to another. We don't really need to qualify the endpoints as client and/or server. From this respect, p2p simply means lack of centralization. From a legal respect, p2p means there's no one place to sue to stop it. Napster was the first major legal win for the music industry, and the first big precedent set towards complete lack of freedom. They had a big database which allowed anyone to find arbitrary content online, but since the intended use of this system was illegal, it could be shutdown. By this same law, why not go after shops that sell bongs and rolling papers? What about stores that sell guns, knifes, crowbars, photocopiers, scanners, CDR drives, etc. Almost every piece of software nowadays has an online component. This means it shares data with another computer in some way. When you send email you are sending data/files to another computer. When you browse, you are actually downloading files. Instant messengers allow file sharing, some even have shared directories. On and on. How long before some -*BAD WORD*- with a hundred billion dollars tries to shutdown all browsers because he wants a hundred billion and one dollars? There are already wheels in motion to add things to hardware/software that would make you vomit. A new version of Intel chips will support encryped machine code. Applications will ship encrypted and will only run on protected hardware and only if you are authorized. If a company wants to prevent you from using a piece of software, they can revoke the key, and it will stop running on your system. Likewise, data files will be encrypted and stuff you buy will only work on your machine and only if they allow it. You will not be able to "rip" stuff from a CD because your sound card will not allow unencrypted digital signals to p!@#$%^&* through. You think this is far fetched? You think "I just won't buy this stuff"? If you own any of the newer SoundBlaster cards, you already have part of this system in your computer. http://www.againsttcpa.com/tcpa-faq-en.html http://www.cdfreaks.com/news/4793 http://www.boycott-riaa.com/
  18. Parts of what code? I would say ALL CODE must be closed-source to make the most secure client. Think of it like this. You design a building with a small section of it very high security. You publish detailed blueprints of the entire building except that one area. Now the location of the secure area can be seen, as well as accesses to and from it. It is that much easier to make an attack plan. Also, let's say you open-source everything except the encryption. People can still take all the open-source files, change ship movement, damage, weapons, walls, etc and cheat. Exactly what parts of a client can you allow someone to modify and recompile without sacrificing security? Not the map, not the physcis, not the network/encrpytion. And how do you distribute the secure part? Are you proposing to make a group of people to make a new client? Let's say you had a new client today. Would any zone start using it? If they did, how long do you think they would stay on the SSC biller? If they lost biller access, then they would isolate themselves from the rest of Subspace. So any real development effort really needs to be client/server/biller/directory-server AND THEN you need to find a host. So basically what it comes down to is making a brand new game from scratch.
  19. First of all, I didn't look into green code because I didn't care about it. It's not like it took me 4 years to figure out. It actually only took me a couple of days. You misquoted me about encryption schemes...and you are wrong. I said that a 32-bit key plus 8 encryption algorithms is the same as a 35-bit key. Who says a single encryption algorithm has to be a single function? You can use the key in any way you want. Maybe each set of 4 bits in a 32-bit key selects one of 16 different algorithms. It doesn't matter. 32-bit key with a 3 bit algorithm selector allows for 2^35 results. Blah blah blah. I do not claim to be the authority on anything, least of all for my part in Continuum. My Subspace experience comes from writing Powerbot, ssVCR, and a few other internal tools. I did what I did without !@#$%^&*istance from anyone. I kept it to myself so as to protect Subspace from cheating for as long as possible. I did not use what I knew to attack servers, or share my knowledge with others who would. You are correct CoCo; It is a waste of your time to participate in this forum. You seem to think that every idea is getting overnight delivered to Priit's inbox, and that he's just sitting there waiting for stuff to do. Since you are the local authority on Subspace, online games, and security (at least according to that guy...what's his name?...oh yeah...Coconut Emulator) you should have no problem releasing your own Subspace replacement by, say, Sunday? I'm looking forward to playing it.
  20. Ping/trace packets are a completely different packet type from those used in game. Routers can handle them differently.
  21. If it blocked bullets then it's a map or map loading bug. This *should* cause level checksum error and boot you.
  22. Saying "magic shrapnel +1" makes nerds get all juicy.
  23. I never see Catid's name on any post. Is he using an alias?
  24. You get no error message when you run makeskin?
  25. It's a DirectX display bug, not Continuum. Update DirectX and/or your video drivers.
×
×
  • Create New...