Basiaclly all DRM models have had variations of that problem. It, again, boils down to what the check is, when they do it, and how often they do it.
For example:
And Denuvo is kind of the worst of all worlds since it is an activation model which, potentially, involves phoning home to a server.
To my knowledge, every single case of “Denuvo killed performance in mah gerhms!!” was either
I am not aware of anything that was fundamentally denuvo itself. I would love to know more if you can point to a documented example but everything I have seen that actually has numbers ends up being one of the above.
I am not going to say that I think Denuvo is good for gaming. I fully accept the importance of DRM for week one sales (which make a huge difference to publishers) and understand that activation models are incredibly useful for that but I also think activation model DRM is fundamentally shite because it renders games unplayable in order “Why is this random ass server plugged in in this closet?”.
But I do think people overly attribute negative performance to denuvo. Implemented correctly, there are MAYBE a few checks per hour and that is system noise. The problem is that, for whatever reason, so many games end up adding the denuvo checks to critical path operations that either completely delay the loading of a new area or tank performance completely because it is checking a dozen times per minute. And that is 100% on Denuvo for not working properly with the studios they license their tools to.
But for the ones who DO implement it sanely? It is barely noticeable to the end user… from a performance standpoint.
Remember kids: Hate mother fuckers for what they actually do. Rather than going the “bitch eating crackers” route.
It’s almost like this behavior comes from the training data.
And they change nothing? It still boils down to human beings being liable.
Hosting costs money. Theoretically (some) cryptocurrency can obfuscate that but… there is a reason graph problems got really popular again for a little bit.
But domain names also cost money. They also need to be registered to a person/company.
That is why a lot of torrent sites end up getting their domain stolen.
Also, all of this ignores the actual developers. But that is par for the course when it comes to discussing liability with open source projects.
Yeah. It is why I really like that Proton basically say "We will turn on you in an instant if we get a legal order. But here is what we’ll actually turn over and here is how you can minimize your vulnerability to that.
C&Ds and legal threats still go to a person who isn’t going to go to jail or have their wages garnished by Mario until the end of their days.
At best you have a single gitlab instance running in a country that is known to not cooperate with those kinds of demands. But… just ask the various torrent sites how well that works after actively pissing off an army of lawyers who don’t mind slipping a hosting company a couple hundred bucks to get the identity and address of the person paying for that.
Plenty of hosts and providers over the years have claimed to be super privacy oriented and blah blah blah. Once they get a legal request, they roll over. Because they aren’t going to prison for the customer anymore than they are going to prison for you.
Nope.
C&Ds and legal threats still go to a person who isn’t going to go to jail or have their wages garnished by Mario until the end of their days.
At best you have a single gitlab instance running in a country that is known to not cooperate with those kinds of demands. But… just ask the various torrent sites how well that works after actively pissing off an army of lawyers who don’t mind slipping a hosting company a couple hundred bucks to get the identity and address of the person paying for that.
What is the alternative?
Closed source “I swear this executable that will let you play all the games you want is legit” hosted on sourceforge or random websites that get hugged to death every day that ends in a y?
Also: it isn’t like that would stop this kind of legal action. MS/Github are barely a factor. It is the devs themselves getting the “hey, stop it or we’ll turn you into indentured servants” letters.
Part of it is the same “human speech” aspects that have plagued NLP work over the past few years. Nobody (except the poor postdoctoral bastard who is running the paper farm for their boss) actually speaks in the same way that scholarly articles are written because… that should be obvious.
This combines with the decades of work by right wing fascists to vilify intellectuals and academia. If you have ever seen (or written) a comment that boils down to “This youtuber sounds smug” or “They are presenting their opinion as fact” then you see why people prefer “natural human speech” over actual authoritatively researched and tested statements.
And… while not all pay to publish journals are trash, I feel confident saying that most are. And filtering those can be shockingly hard by design.
But the big one? Most of the owners of the various journals are REALLY fucking litigious and will go scorched earth on anyone who is using their work (because Elsevier et al own your work) to train a model.
We live in a world where everything you do or say on the internet is potentially part of someone else’s training data. Lemmy is already a shitshow for that but you can bet that “ooh, piracy board” is fair game for everyone because nobody would be dumb enough to sue about that.
If someone wants to delete a comment for ANY reason, they are more than welcome to.
… mostly the other way around?
Theoretically it is possible that a compromised machine could compromise a USB stick. If you are at the point where you are having to worry about government or corporate entities setting traps at the local library? You… kind of already lost.
Which is the thing to understand. Most of what you see on the internet is, to borrow from a phrase, Privacy Theatre. It is so that people can larp and pretend they are Steve Rogers fighting a global conspiracy while necking with a hot co-worker at an Apple store. The reality is that if you are actually in a position where this level of privacy and security matters then you need to actually change your behaviors. Which often involves keeping VERY strong disconnects between any “personal” device and any “private” device.
There have been a lot of terrible (but wonderfully written) articles about journalists needing to do this because a government or megacorporation was after them. Stuff like having a secret laptop that they never even take out of a farraday cage unless they are closer than not to an hour away from wherever they are staying that night.
I think any “privacy oriented OS” is inherently a questionable (kneejerk: Stupid and reeks of stale honey) strategy in the first place.
A very good friend of mine is a journalist. The kind of journalist where… she actually deals with the shit the average person online larps and then some. And what I and her colleagues have suggested is the following:
Two flash drives
Given the option? Boot the public computer to the live image. Regardless, use the latter to access whatever chat or email accounts (that NEVER are logged into on any machine you “own” or near your home) you need.
It isn’t about being reasonable.
If you are expected to track your time to this degree (and, to make it clear, the majority of employers actively don’t want you to), there is a reason. That reason usually being different funding sources. Generally a mix of grants and clients.
And if a client or grant source finds out you are lying about those? Maybe you only had enough work to do 34 hours instead of 40 hours in one week. Would you be cool paying extra because the guy repairing your muffler had a slow week?
And if people think being proud of a tool that openly talks about what everyone else silently does isn’t a red flag for employers? Hey, its a great job market so I am sure none of that will matter.
Tracking time is fine.
Normalizing your time to the hours you were supposed to work is a massive no no. Especially if you are expected to break down your hours per project.
I mean, you obviously do it. But you never put it in writing.
Pretending the most important use of bit torrent is Linux ISO’s is the kind of cya that people giggle at.
If a candidate I am interviewing has a tool to change their reported hours to me or clients on their public GitHub? That person is radioactive no matter how many times they say “but don’t do anything naughty wink wink”
So … it is a tool to automate time fraud?
Make sure to put this front and center on your CV
Is saving the game from an early leak worth getting rid of physical games? I hope not.
As a PC gamer who has been basically digital only since the late 00s/early 10s? Probably?
But the thing to remember is that, like with DRM, the studios have this data. There are orgs dedicated to analyzing (and selling…) sales data that can detect the impact that Mass Effect PC being “unplayable” for pirates because of securom for the first week or so had on sales (anecdotal but… probably real positive). Because this kind of stuff costs money (well, less so for removing a disc drive…) and they aren’t going to do that if they think it will hurt revenue.
Releasing physical months after the digital release basically guarantees you are only selling to enthusiasts and it no longer is economically viable. That is why companies like LRG exist.
Yeah. Although I guess now I don’t really know how resin would handle those kinds of support either.
And yeah, it is pretty funny that a resin printer and curer and ventillation setup comes out cheaper than most 40k armies. But the answer probably is to scale up models (there is an artist on mastodon I keep meaning to throw money at).
Thanks