Jump to content
The Dark Mod Forums

Zerg Rush

Member
  • Posts

    1029
  • Joined

  • Last visited

  • Days Won

    17

Posts posted by Zerg Rush

  1. I think that despite being a thief, in TDM in many missions getting more or less loot has become secondary, but rather fulfilling different more complex objectives, finding certain things, investigating a conspiracy, discovering secrets, etc. Based on this, you can even add a little more realism regarding the amounts of stolen items, so as not to leave poor Garrett climbing and jumping with half a ton of gold on top. Or it may be, as I have seen in other games, that the protagonist loses mobility little by little because of the weight of the loot, until he gets it deposited somewhere temporarily or in the hands of an ally.  This would add a dimension of strategy and planning to the mission.

  2. 11 hours ago, revelator said:

    oh i dont wanna attempt that, just curious, also i reckon it would be asking for trouble accessing darknet from a phone 😆 your practically inviting the NSA to be all over your ass hehe.

    Yes, the TOR network was created by US defense and secret services as system for secure intern communication. Already is used by them, also by universities and research centers (apart of drug dealers, pedofiles, hackers, weapon dealers, killer services and curious unwary with his shabby insecure laptop with TOR)

    • Thanks 1
  3. I think that there is a TOR browser for Android, but it's not so recommended to surf the DarkWeb with the mobile. Well, the speed depends, but anyway is lower as with the normal conections, due the tunnel of the TOR network leads through several servers. This necessarily slows down compared to your ISP's normal server conection. For this the TOR network isn't so good for streaming services.

  4. If you only use the DNScrypt proxie in normal use, there are no problems and give more security if you use WiFi which is not yours. apart it cut of most ads, even in the instaled apps. TOR also is usable in the normal internet, which gives an extra layer of security, but its slow down the speed. I2P isn't for the Dark Web, it's for the decentralized network of user servers, it's not the same, but normaly you don't need it. In public WiFi, with TOR and DNScrypt proxie, any hacker bites into a rock, if he want to intercept you.

    You can't acces the DarkWeb if you don't have the TOR browser, capable to acces websites with .onion adress, a normal browser can't do this. The TOR network isn't the same, it only leads your conection through a tunnel of the TOR network, hiding your IP and ISP to the sites you visit in the normal internet.

  5. Oh, I think Vivaldi is doing very well on his way, even to the point that Google tried to boycott it with discriminatory browsersniffing on Google partner pages and those of Google itself, for example Blogger. This has caused that Vivaldi, in the interest of the user, has dispensed with the UA as Vivaldi, passing it as Chrome, with which suddenly the problems disappeared. Vivaldi is a headache for Google, despite being a browser with little market share yet, but very very good devs.

    • Haha 1
  6.  

    Perplexity.ai say

    Based on the search results, it seems that .kkrieger is a first-person shooter game created by a German demogroup called .theprodukkt. The game won first place in the 96k game competition at Breakpoint in April 2004. The game's size is only 97,280 bytes, which is much smaller compared to most popular first-person shooters that fill one or more CDs or DVDs, which may be over 7000 times .kkrieger's size [2]. The developer team achieved this small size by exploiting the Direct3D API and DLLs of the Windows operating system. As a result, .kkrieger can only run on Windows. It is essentially a demo showing how far the capabilities of Direct3D can be pushed with an absolute minimum amount of code [8].

    Here are some technical details about how .kkrieger is created based on [13]:

    • .kkrieger makes extensive use of procedural generation methods.
    • Textures are stored via their creation history instead of a per-pixel basis, thus only requiring the history data and the generator code to be compiled into the executable, producing a relatively small file size.
    • Meshes are created from basic solids such as boxes and cylinders, which are then deformed to achieve the desired shape - essentially a special way of box modeling.
    • These two generation processes explain the extensive loading time of the game - all assets of the gameplay are reproduced during the loading phase.
    • The game music and sounds are produced by a multifunctional synthesizer called V2, which is fed a continuous stream of MIDI data. The synthesizer then produces the music in real time.

    If you are interested in downloading and playing .kkrieger, you can find it on GitHub [0]. If you want to install it using Chocolatey, you can use the following command:

     
    $packageArgs = @{ packageName = "$env:chocolateyPackageName" url = 'https://files.scene.org/get/parties/2004/breakpoint04/96kgame/kkrieger-beta.zip' UnzipLocation = "$(Split-Path -Parent $MyInvocation.MyCommand.Definition)" checksum = '0de0b9abafd78cf7f57fb264c7136ace52b2653f5c675574d0f10eda0a654c9f' checksumType = 'sha256' } Install-ChocolateyZipPackage @packageArgs
     
    • Like 1
  7. In some years and the tecnology advance, someone can run TDM in a pregnancy test. I find it much more amazing that some years ago they created a 3d FPS, in a 96 kB file, some of our avatars in this forum are heavier. This I call an optimized game

     

     

  8. 1 hour ago, Xolvix said:

    Very true, but if that's the case then Vivaldi is a bit of an oddity. Despite using Chromium the browser isn't actually open source, it's more of a hybrid between open source and proprietary code. Which is fine, except that if you consider ethics important, moving away from a pure FOSS browser (Firefox) to one that's part proprietary (Vivaldi) seems like the wrong direction... unless it's a compromise with features vs licensing, which I kinda understand. In the end though it's still a browser using Chromium as its rendering engine which means that no matter what position they have publically against Google, they're still relying on Google tech for the most important part of the browser. The browser monoculture keeps marching on...

    Ehm, it's not so easy. It is true that part of the script referring to the UI is proprietary licensed, but fully auditable and even modifiable by the user, they even teach how to do it (of course at your own risk).

    There were internal debates about this topic and why they don't release this 5% of the code. The reasons are very clear when looking at the current browser market, 80% monopolized by Chrome and Edge, apart from endless forks of all kinds based on Chromium. Vivaldi is a small cooperative with a small market share, but with absolutely unique features, based on this protected little part of the script that everyone tries to imitate, early Chrome and Edge, albeit with poor results. If Vivaldi releases this code, the result would be the end of Vivaldi, a Chrome that monopolizes these functions and ends up completely dominating the market, with no one to shadow it.


    FOSS is a good thing, allowing to share and collaborate in the development of new software, which is the main task of this system, but in the case of Browsers, where there are already more than 100 forks of all kinds of Blink mainly, Whether it is a FOSS product or not becomes secondary, all of them can create and share development with the base that is 100% FOSS, mainly in the way of removing the influence of Google and MS from this base, Provide Google with the possibility of making these modifications their own will be the end for others, handing over the market to Google.


    The ethics of the company has nothing to do with this, it is expressed in the ethics it has with the user and this has nothing to do with whether it is FOSS or not.
    See the example with Firefox, it's 100% FOSS and its poor user ethic with things Vivaldi would never do. In the 7 Jears I used this Browser Ive seen the Devs even working and releasing patches in Sundays to fix small bugs. They work on base of most voted feature requests of the user, offering, apart from the browser a free mail account and a blog for private use, apart a Mastodon instance included in the account and full user support with the team members active in the community forum, even with Jon von Tetzchner itself as often as he can, if he isn't occupied with conferences from EEUU to Japan because of Security and privacy themes, promoting EU tech in Belgium in collaboration with europena Tech centers.

     

     

  9. Vivaldi has it's own inbuils ad and trackerblocker, customizable with the filters you want, nor it use surveillance advertisings or selling user data, 0 tracking no ads, it's business model are links and search engines it has by default (f.Exmpl. DDG, Ecosia and some others) when you download the browser, from these recives commissions when you use them, but you are free to delete them if not. That is a fair solution, apart also donations and a store with merch. Recently maybe also commissions from Mercedes, Renault and VAG, because they use Vivaldi in their navigators, because Vivaldi is the only Browser which works in these dispositives, not even Google has succeeded. Not bad for a so small company.

    Also the ethics of a company is important.

  10. Because of this and similar behavior tangential to the user interests of Mozilla, also reported by several users, I and a lot of others changed to Vivaldi. Also some Linux communities, in some of them use Vivaldi by default (Manjaro, FerenOS), most others have it in the repository. It is ironic that Mozilla becomes a mascot of Google, while this Chromium Browser from a small cooperative gives Google the middle finger in its browser, whose CEO is even active in initiatives against Google's invasive practices.

    63O092.png

  11. I don't have rooted my phone, but, as I say, I also don't have any relevant data stored in it, I don't use apps from Google Play Store if possible, nor socialmedia apps, using as much as possible FOSS from F-Droid, one of them (recommended) InviZible Pro, and only connect to WiFi if needed (f.exmpl.updates), reviewed all the permissions of the apps I use, leaving them only strictly necessary and configured that they do not continue to be resident after use. Also an AV, because Google Play Protect is a joke, a better placebo.

  12. 13 hours ago, kano said:

    https://arstechnica.com/information-technology/2023/05/potentially-millions-of-android-tvs-and-phones-come-with-malware-preinstalled/

     

    Android is the new Windows 98. Except that in the days of Windows 98, you could easily erase the system and reinstall from fresh, officially pressed media if you had any reason not to trust it or think that it was compromised.

    They always wanted to put an aluminum cap on me when I said that mobile phones are not secure devices to be used so happily with banking or administrative apps, not even to have other sensitive data on them.
    Apart from the number of ads and trackers that manufacturers already put by default, any mediocre hacker can intercept them in a matter of seconds, as has been shown plenty in the past. A PC is not 100% secure either, but in exchange for a mobile you have infinitely more possibilities to protect the content
    Comparing mobile phones with Windows 98 is falling short in terms of security. It is convenient to review the permissions that each app has and the corresponding PP that they have, to realize, adding to the OS conditions with security holes of a Swiss cheese and company logs, that the user walks with a sign with all his data hanging around the neck.

    https://arstechnica.com/information-technology/2021/03/16-attack-let-hacker-intercept-a-t-mobile-users-text-messages/

    https://www.snexplores.org/article/smartphones-put-your-privacy-risk

    https://theconversation.com/smartphone-data-tracking-is-more-than-creepy-heres-why-you-should-be-worried-91110

    • Thanks 1
  13. In a fantasy world everything is possible. depends only on the imagination of the mission devs. Any kind of plagues, entities supernaturales, time travels, other dimensions, magia, impossible inventions and weapons can be seen in all the mission released until now. Even a Thief capable de jump and climb with a ton of loot, but not when carrying a person.

    • Haha 1
  14. In any case, Windows cannot be blamed for being the most insecure OS, at least not in recent years, it is not, the only thing that can be criticized is privacy and the Bloatware that it contains by default, although it can be remedied by of the user.

     

×
×
  • Create New...