Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:If you don't control it it's compromised. (Score 1) 86

Even a simulation of the inputs won't prevent all cheating. What if someone has an x-ray hack in place, and maybe even a bot attached that can play a perfect game? The best solution is to just not give a crap and not have online leaderboards or IAP so the only people affected by the hacking are the hackers themselves.

PvP is a problem though. There's not a lot you can do to prevent some forms of cheating in PvP, but on the mobile space PvP isn't nearly as important anyway. Usually it boils down to "user A submits an army list to the server, user B submits an army list to the server, the server simulates a battle, and then returns the results to both players". As long as your game isn't structured like a CCG with overpowered "rare" units that are supposed to be balanced by being difficult to get (or requiring real money) then it's not so bad. The cheater can submit an optimal army without having to grind, but otherwise they aren't ruining the game for other people too much.

Comment Re:Lets encrypt (Score 2) 104

I always find it amazing that these huge companies with enormous public domains don't have a person who's job description includes managing all of their certs and making sure they don't expire. You could even assign the job to two people just to make sure one of them doesn't get sick or something and miss one.

Comment Re:Governments way to admit that bitcoins are... (Score 1) 144

They were caught because the investigator was on a $150,000/year salary with a homemaker wife and deposited $750,000 in his bank account one year. Then logs from DPR's laptop confirmed it was him. Basically, he was totally and completely brazen about stealing the bitcoins both from DPR and from the government.

Comment Re:OSX (Score 1) 196

If that was installed by default and reasonably discoverable I wouldn't complain nearly as much about this, but your average person has virtually no chance of just discovering this without some deep Googling.

Comment Wildly inconsistent is putting it mildly (Score 1) 159

Those meters are all over the place. As the article mentioned, the majority of them only count the number of characters in each class, so they're pretty terrible at actually telling you how hard your password is to crack. Some of them are set to an absurdly high level too. The default Ubuntu meter for instance requires something like 16 characters before it will even consider your password good. I saw one where it wouldn't take your password unless it was at least 14 characters long, had all classes of characters in it (upper, lower, number, symbol), no more than two of the same class together, and "no patterns". At that point you just kind of have to accept that I'm going to stuff it in a password manager even though your site expressly forbids me recording my password elsewhere.

Slashdot Top Deals

Never test for an error condition you don't know how to handle. -- Steinbach

Working...