![](https://lemmy.one/pictrs/image/73065505-1298-434d-9968-2cfe8ed3864d.png)
![](https://lemmy.ml/pictrs/image/h1ChnLuBHr.png)
HAHAHHAHAHAHAHAHAHAHAHAHAHAHAHHAHAHAHAHAHAHAHAHHAAAA
No.
HAHAHHAHAHAHAHAHAHAHAHAHAHAHAHHAHAHAHAHAHAHAHAHHAAAA
No.
0.00000003% 3 Satoshis of a percent.
This actually doesn’t surprise me. Valve is getting greedy.
But; to be clear; by using these tools, to unlock the DLC without paying for it, you are cheating in the game. That’s a mere fact; and not a moral judgement of anyone choosing to do so.
Personally, I don’t judge anyone for doing so; and would use these tools myself if I thought a DLC were too predatory, expensive or otherwise unfair to not have it available.
That’s not saying it’s fair or right for Valve to do so; nor is it saying the VAC bans or account suspensions are deserved. If you get hit by this; you absolutely should pirate every title you already own/purchased via Steam right away, and pirate anything else you want in the future.
The only way to make them regret doing things like this is voting with your wallet; and asking others to do the same. Stop spending money on Valve. Once their earnings fall they’ll be forced to hear people’s concerns.
Godspeed. May this measure succeed with all haste and become the new normal.
For once it overtakes one country; others can choose to follow suit as best as they can.
Removed by mod
I have a /48 that I can basically roll through.
A /64 is more than enough though to prevent most casual attempts at entry; and does force more work / enumeration to be done to break into a network and do damage with. I’m not saying the privacy extensions are the greatest; but they do work to slightly increase the difficulty of tracking and exploitation.
With a /48 or even a /56; I can subdivide things and hand out several /64s to each device too; which would shake up things if tracking expects a /64 explicitly.
I actually use /55s to cordon off blocks inside the /48 that aren’t used too. So dialing a random prefix won’t help. You’d be surprised how often I get intrusive portsweeps trying to enumerate my /64s this way…and it doesn’t work because I’m not subnetting on any standard behavior.
In most sharing channels you could possibly just report those to the channel ops (@/&/!/~) and get them kicked or devoiced (removing their (+ or %) state depending on the channel)
I don’t know any channel that would put up with people who wasted your time with DRM’ed files back in the day. It’s less problematic now yes; but still something they don’t want people doing…since you have to be signed in as the purchasing account to de-drm something.
I run both because of this; and because SLAAC enables features in Desktop OSes that offer some level of additional privacy.
For example; Windows can do “Temporary IPv6 Addressing” that it will hand out to various applications and browsers. That IPv6 address rotates on a periodic basis; once every 24 hours by default; and can be configured to behave differently depending on your needs via registry keys.
This could for example, allow you to quickly spin up a small application server for something; like a gaming session; and let you use/bind that IPv6 address for it. Once the application stops using it and the time period has elapsed; Windows drops the IP address and statelessly configures itself a new one.
What happens is what’s intended.
Everyone is going to do it; and it will cause companies, artists and creatives to step back and rethink a bit on how they monetize their creations responsibly. The ones that refuse to rethink and adapt will fail and flounder under the tiny handful of straw that Piracy adds to the load.
That’s a GOOD thing.
What’s unfortunate is that companies and people still think it’s productive to worry and handwring over piracy as if it’s killing someone; instead of being the thing you “don’t fly too close to, lest your wax wings get melted off and you plummet to the ground.”
I get a free /64 and /48 directly from Hurricane Electric using their TunnelBroker and use PFSense to deploy that v6 locally on my LAN. Everything in the house has a v6 and is protected by the necessary firewalling too.
This is why I use PFSense and Hurricane Electric as a v6 tunnelbroker. I have working functional IPv6 with SLAAC and DHCPv6 and full Routing Advertisements on my LAN running side-by-side so that no matter which the device implements how poorly; it gets an IPv6 address and it works and is protected by the firewall.
You can automate this; but you have to make sure that the automation you create is going to respect the ratelimits. I’d recommend something simple like using a command alias or short script written for your specific IRC client.
It’s what I used to do with that sort of thing; and there are plenty of well known Open Source scripts in the wild as well
As an example; I would use mIRC with it’s scripting system and write my own event trigger scripts to automatically request, wait for and then accept the DCC chat requests and route them appropriately in the interface. There were also scripts that helped with getting the lists; unpacking them, and displaying those lists in my client…so I didn’t have to extract the text from the zip myself, and could select what I needed from the bot.
All of this was lightweight automation that was intended not to flood the bot with commands and fed into command queueing modules that let the bots have time to process.
Sometimes in those days you could get actually (+b)anned, Auto/KILL’ed or /(G/K):LINE’ed for causing a bot to crash…so you had to be careful and respectful with regard to scripts.
TL;DR; know your bot, source channel & network rules, and write your own scripts for safety or read any scripts you import in carefully and understand what they’re doing.
That signal might be insignificant to us; but it may be their way of establishing a timescale.
The time may be derived from how long their planet takes to rotate…aka the length of one sub-unit of their day…aka 1/24th of their day.
I’d argue that a more precise timing like 53.8 minutes is more attention grabbing. It shows finer grained control of technology; a “look here! we can do this too!” sort of demonstration.
If we are the “more advanced” neighbor; then I could see that being done.
Personally I think the more complex pattern of having 3 different states being cycled through once an hour is significantly less likely to be natural.
That, of course, doesn’t mean much by itself; it still is possible that it is natural and we just don’t understand why. More research into how and why that is happening is absolutely required to answer the question. I just don’t know if we will do it, or if we have the tech needed to fully investigate it yet.
Your comment missed the mark entirely. Please don’t reply-guy me; I know what I’m talking about.
So much for using airplane mode to conserve battery.
Your understanding is slightly off.
Airplane mode Does In Fact Turn off your CELLULAR Radio This radio is what powers your (2/3/4/5)G and LTE (This is 4G btw) connection to the cell towers.
Most international radio communications laws can prohibit the use of Cellular Radio in flight; however they often don’t prohibit the use of shorter range radio technologies such as WIFI or Bluetooth.
It’s all about ‘loudness’. Think about it. Your phone must ‘scream louder’ at a farther away cell tower than it would need to communicate with a nearby WiFi router or a Bluetooth headset.
…Assuming the flash drive isn’t loaded to the gills with malware alongside of every game it offers to install…that sounds fair.
But let’s be real; No legitimate company stands a chance of doing this without getting sued into oblivion. Unfortunately that means the risk of getting viruses and malware with your purchase, likely ransomware or cryptominer droppers, is really high.
…but let’s assume you’re technical enough that you can disarm all the malware on the USB stick and clean the cruft out of it. Then; yeah…maybe you’ll get your value’s worth.