Violation of Security/Privacy...
    Rob Windsor 
    windsor at warthog.com
       
    Tue Oct 11 22:43:28 PDT 2005
    
    
  
Gwendolynn ferch Elydyr wrote:
>> You could argue that if all that gets passed is hashes, then its 
>> harmless. However, what if thoses hashes are of files that are 
>> considered subversive, or key phrases that are related to terrorist 
>> activities, or any number of 'lawful intercept' reasons.
> Actually I don't see why they'd pass anything other than a binary
> pass/fail.  Either there's a match, against -something-, or there isn't.
> In a game context, any match would mean you were cheating.
And then there's the way Mythic handles this situation -- any file not 
matching the "current" hash is updated via a pull from the server.
All of this is handled on the client side so the servers only see a pull 
request for the current file.
This has the side-benefit of allowing users to zip/rar/tar/cpio the 
install area on one computer and extract archive on another computer to 
shorten the update time on a fresh install.
IMO, if you've installed someone's software and agreed to their explicit 
EULA, you've accepted your fate.  Otherwise, uninstall and vote with 
your money.  (WoW isn't the only gui-MUD [er.. "MMORPG"] out there, if 
you're adamant about wasting time on a computer.)
Rob++
-- 
Internet: windsor at warthog.com                             __o
Life: Rob at Carrollton.Texas.USA.Earth                    _`\<,_
                                                        (_)/ (_)
"They couldn't hit an elephant at this distance."
   -- Major General John Sedgwick
    
    
More information about the Baylisa
mailing list