I'm partial but we really applied ourselves to not make it p2w even though items are functionally different. The only item that's p2w is the revolver - which will win you any "cool gun" competition. Only (minor) problem is that it's not that good. š¤·
FloorPie wrote on Feb 13, 2024, 00:13:That's just you affecting you. Doesn't even make sense, boycotting products that aren't rootkited, or can't be.fotalbre97 wrote on Feb 12, 2024, 06:50:Jim wrote on Feb 11, 2024, 21:27:
so.... aside from rootkits being "scary" - how has one ever affected people? yeah, no doubt "computer slowdown" but they say that about everything so the phrase is meaningless.
Sony BMG did this same shlte in 2005 with their XCP rootkit and it allowed viruses to evade detection by anti-virus programs news.bbc.co.uk/2/hi/technology/4427606.stm
It's disingenous to say that rootkits have not "ever affected people"
This, the sony music cd rootkit drama got me to boycott all Sony products for over 10 years.
fotalbre97 wrote on Feb 12, 2024, 06:50:Jim wrote on Feb 11, 2024, 21:27:
so.... aside from rootkits being "scary" - how has one ever affected people? yeah, no doubt "computer slowdown" but they say that about everything so the phrase is meaningless.
Sony BMG did this same shlte in 2005 with their XCP rootkit and it allowed viruses to evade detection by anti-virus programs news.bbc.co.uk/2/hi/technology/4427606.stm
It's disingenous to say that rootkits have not "ever affected people"
Burrito of Peace wrote on Feb 12, 2024, 11:11:Prez wrote on Feb 12, 2024, 10:10:
Calling people idiots because they don't know about/don't care about rootkits is a bit harsh. I'm fairly sure that rootkits aren't scary to most people because they either have no idea what they are or have never experienced first-hand anything close to the worst case scenario because of them so they are viewed as a low or non-threat. They are the digital bogeyman to them.
It's more than that, Prez. My field has spent decades, and probably billions of dollars, at this point trying to get people to stop treating their computers and devices like toaster whores and educating them on the dangers they face. Everyone from tier one techs up to senior system architects have been sending the same messages and have personal, direct experience with the fallout from users that keep themselves intentionally and malignantly ignorant. We've made the message clear, we've made the message "fun" (for certain definitions of the word), we've made the message scary. We know it takes one machine, one, to plant the seed for a nightmare scenario to take root and flourish. One user's willful idiocy means headaches and fear for many other people. There's only so much myself and colleagues can do on the backend.
To put it another way, you tell someone "Don't touch the stove. It's hot and you'll burn yourself" and they keep touching the stove. Over and over and over again. They get burned, usually badly, every single time they do. At what point do you tell them "You're an idiot"?
Kosumo wrote on Feb 11, 2024, 21:03:Burrito of Peace wrote on Feb 11, 2024, 20:49:
[quote="Teddy"Feb 11, 2024, 20:36"20096
And it's an enormously fun game if that doesn't bother you.
A person is an idiot if it doesn't. So ~1 million idiots and counting.
Prez wrote on Feb 12, 2024, 10:10:
Calling people idiots because they don't know about/don't care about rootkits is a bit harsh. I'm fairly sure that rootkits aren't scary to most people because they either have no idea what they are or have never experienced first-hand anything close to the worst case scenario because of them so they are viewed as a low or non-threat. They are the digital bogeyman to them.
Jim wrote on Feb 12, 2024, 00:02:
so in other words you gots nothing, so you are just going to go with theoretical scenarios. like someone is going to spend the time and effort it takes to develop a hack that can only target 1 million PCs that have this game installed. You know why apple computers don't have viruses? Because their market share is so small it isn't worth it.
.
Jim wrote on Feb 11, 2024, 21:27:
so.... aside from rootkits being "scary" - how has one ever affected people? yeah, no doubt "computer slowdown" but they say that about everything so the phrase is meaningless.
Hellcinder wrote on Feb 12, 2024, 04:07:
Any game played online in an mmo capacity has a particular āroot kitā security to prevent cheating.
Jim wrote on Feb 12, 2024, 00:02:Burrito of Peace wrote on Feb 11, 2024, 23:13:so in other words you gots nothing, so you are just going to go with theoretical scenarios. like someone is going to spend the time and effort it takes to develop a hack that can only target 1 million PCs that have this game installed. You know why apple computers don't have viruses? Because their market share is so small it isn't worth it.Jim wrote on Feb 11, 2024, 21:27:
so.... aside from rootkits being "scary" - how has one ever affected people? yeah, no doubt "computer slowdown" but they say that about everything so the phrase is meaningless.
Oh my sweet summer child.
Rootkits, by their very definition, are malware. There have been many, many rootkits over the years that have affected systems and people and the sum total damages from them trends well in to the billions of dollars. They are one of the most, if not THE most, invidious types of malware around. I'm going to drop a layman level explanation of rootkits for you:
A rootkit does exactly what it says on the tin. It grants the process total access to the root of the system (root on Linux or ring 0 on Windows). Because it is now an authoritative system process, it can do whatever it wants without restriction to that system...often without the average user ever knowing it is even there. Credential theft? Easy. Use that system as a node in a DDoS network? Easy. Cryptomining? Easy. Plus many other nefarious uses.
Undoubtedly someone is going to say "But it's from Sony/whatever company they are doing business with!" The problem though is all it takes is for one dedicated person to find an exploit for it and then craft a hijack for it. Now that person has access, and can sell that access, to whatever system has that particular rootkit version installed. They don't have to do any real additional work because the targets already completed 70% of the work for them.
There are people whom still compute like it's the early 2000s and they are idiots in my opinion. We face a plethora of APTs on a level never before seen in human history. We face a corporate landscape that is exploitive to the point that it would make robber barons of the 19th century green with envy while also simultaneously putting as little money as possible, and almost zero foresight in to, protecting the data and access they have to consumers. There's a reason the concept of zero trust is such a massive deal now. Not only can you not trust third parties, you really shouldn't even be trusting the devices on your own network.
There are people who are going to call me paranoid and that's OK. I have been paid well for many years to be as paranoid as possible without having a psychotic break with reality. But I can also say that in 24 years, I have never had a single breach or infection on any system for which I have direct authority and responsibility. I didn't get that track record by being complacent and saying "Oh this rootkit is fine because it is from Name Brand Company."
.
Burrito of Peace wrote on Feb 11, 2024, 23:13:so in other words you gots nothing, so you are just going to go with theoretical scenarios. like someone is going to spend the time and effort it takes to develop a hack that can only target 1 million PCs that have this game installed. You know why apple computers don't have viruses? Because their market share is so small it isn't worth it.Jim wrote on Feb 11, 2024, 21:27:
so.... aside from rootkits being "scary" - how has one ever affected people? yeah, no doubt "computer slowdown" but they say that about everything so the phrase is meaningless.
Oh my sweet summer child.
Rootkits, by their very definition, are malware. There have been many, many rootkits over the years that have affected systems and people and the sum total damages from them trends well in to the billions of dollars. They are one of the most, if not THE most, invidious types of malware around. I'm going to drop a layman level explanation of rootkits for you:
A rootkit does exactly what it says on the tin. It grants the process total access to the root of the system (root on Linux or ring 0 on Windows). Because it is now an authoritative system process, it can do whatever it wants without restriction to that system...often without the average user ever knowing it is even there. Credential theft? Easy. Use that system as a node in a DDoS network? Easy. Cryptomining? Easy. Plus many other nefarious uses.
Undoubtedly someone is going to say "But it's from Sony/whatever company they are doing business with!" The problem though is all it takes is for one dedicated person to find an exploit for it and then craft a hijack for it. Now that person has access, and can sell that access, to whatever system has that particular rootkit version installed. They don't have to do any real additional work because the targets already completed 70% of the work for them.
There are people whom still compute like it's the early 2000s and they are idiots in my opinion. We face a plethora of APTs on a level never before seen in human history. We face a corporate landscape that is exploitive to the point that it would make robber barons of the 19th century green with envy while also simultaneously putting as little money as possible, and almost zero foresight in to, protecting the data and access they have to consumers. There's a reason the concept of zero trust is such a massive deal now. Not only can you not trust third parties, you really shouldn't even be trusting the devices on your own network.
There are people who are going to call me paranoid and that's OK. I have been paid well for many years to be as paranoid as possible without having a psychotic break with reality. But I can also say that in 24 years, I have never had a single breach or infection on any system for which I have direct authority and responsibility. I didn't get that track record by being complacent and saying "Oh this rootkit is fine because it is from Name Brand Company."
Burrito of Peace wrote on Feb 11, 2024, 23:13:Jim wrote on Feb 11, 2024, 21:27:
so.... aside from rootkits being "scary" - how has one ever affected people? yeah, no doubt "computer slowdown" but they say that about everything so the phrase is meaningless.
Oh my sweet summer child.
Rootkits, by their very definition, are malware. There have been many, many rootkits over the years that have affected systems and people and the sum total damages from them trends well in to the billions of dollars. They are one of the most, if not THE most, invidious types of malware around. I'm going to drop a layman level explanation of rootkits for you:
A rootkit does exactly what it says on the tin. It grants the process total access to the root of the system (root on Linux or ring 0 on Windows). Because it is now an authoritative system process, it can do whatever it wants without restriction to that system...often without the average user ever knowing it is even there. Credential theft? Easy. Use that system as a node in a DDoS network? Easy. Cryptomining? Easy. Plus many other nefarious uses.
Undoubtedly someone is going to say "But it's from Sony/whatever company they are doing business with!" The problem though is all it takes is for one dedicated person to find an exploit for it and then craft a hijack for it. Now that person has access, and can sell that access, to whatever system has that particular rootkit version installed. They don't have to do any real additional work because the targets already completed 70% of the work for them.
There are people whom still compute like it's the early 2000s and they are idiots in my opinion. We face a plethora of APTs on a level never before seen in human history. We face a corporate landscape that is exploitive to the point that it would make robber barons of the 19th century green with envy while also simultaneously putting as little money as possible, and almost zero foresight in to, protecting the data and access they have to consumers. There's a reason the concept of zero trust is such a massive deal now. Not only can you not trust third parties, you really shouldn't even be trusting the devices on your own network.
There are people who are going to call me paranoid and that's OK. I have been paid well for many years to be as paranoid as possible without having a psychotic break with reality. But I can also say that in 24 years, I have never had a single breach or infection on any system for which I have direct authority and responsibility. I didn't get that track record by being complacent and saying "Oh this rootkit is fine because it is from Name Brand Company."