whats your opinion on open source ac, following the model of cryptography. This should give the user trust. However i'm not quite sure in what level that would reduce the difficulty of finding bypasses.
-
-
i wonder why. Are there more attack vectors besides WinAPI, Kernel, HV and HW? WinAPI and Kernel are fairly easy to prevent. HV and HW are already in the realm where someone has to have some level of knowledge about what he's doing. Plus HW isn't scalable
-
cheats and anti cheats both fight for control/visibility from the same position. when cheaters know how ac works, they have an advantage. the reverse is also true, but a profit motivated cheaters may not open source their bypasses, even if the ac is open source
- 10 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.