• 30 Posts
  • 3.38K Comments
Joined 1 year ago
cake
Cake day: July 9th, 2023

help-circle








  • And I’ll add on to that, even if every GPU company stops innovating, we’ll still have older cards and hardware to choose from, and the games industry isn’t going to target hardware nobody is buying (effectively pricing themselves out of the market). Indie devs especially tend to have lower hardware requirements for their games, so it’s not like anyone will run out of games to play.




  • I’m a PC gamer, and it looks like things are stagnating massively in our space.

    I would like to introduce you to the indie game scene. Where AAA is faltering, indie has never been in a better place.

    Overall, I don’t see things the way you see them. I recommend taking a break from social media, go for a walk, play games you like, and fuck the trajectory of tech companies.

    Live your life, and take a break from the doomsaying.


  • That’s kind of my thought as well. It’s certainly possible someone might go through the effort to find a single pirate downloading The Lion King, but that’s a lot of effort (read: money) to find just one person.

    There’s certainly the possibility that an ISP could note that you connected to a VPN, but given that it’s not a remarkable event, since people connect to VPNs for all kinds of legal reasons, they aren’t likely to track your particular IP’s connection to a VPN apart from a court ordering them to care. They get paid their monthly internet plan price whether someone pirates or checks their email.

    If someone was running the Pirate Bay from their home servers, however, more parties would likely be interested in finding that person, and that person’s threat model probably exceeds just using a logless VPN.







  • TelorandtoTechnology@lemmy.worldBe careful.
    link
    fedilink
    English
    arrow-up
    2
    ·
    2 days ago

    I’m talking about TOTP in something like Bitwarden or Authy. You can still social engineer your way to getting a code, but a scammer would have to convince the user to reveal that secret, not just pretend to send a code.