Thankfully I have a *** of them in my bank already... And enough Iron for a Lifetime... (or at least a couple more Levels...)
While this is true and it's why pos-hacking and other botting mechanisms are possible, the server could detect 'impossible' character movement but the fact we're seeing pos-hacking here shows ESO doesn't.Any code that is on your own computer/hard drive is fully under your control. You can change it in any way you want, and there is no way anyone could stop you.
Trust me, they dont last that long.
While this is true and it's why pos-hacking and other botting mechanisms are possible, the server could detect 'impossible' character movement but the fact we're seeing pos-hacking here shows ESO doesn't.
Any code that is on your own computer/hard drive is fully under your control. You can change it in any way you want, and there is no way anyone could stop you.
Not when the hack is done 'on the wire' by packet sniffing, modification and injection, some of this stuff never touches the client program at all.cheeser123 wrote: »Right, but they could also have the client-side software check its own consistency. There are secure / valid ways of doing this, and that would prevent some of these issues.
Not when the hack is done 'on the wire' by packet sniffing, modification and injection, some of this stuff never touches the client program at all.
How do you think the bots get to know where the nodes are? How do you think they perform their teleports? Some may inspect the game client's memory, others don't go anywhere near it.
cheeser123 wrote: »
Right, but they could also have the client-side software check its own consistency. There are secure / valid ways of doing this, and that would prevent some of these issues.
Cypherseeker wrote: »Is this what causes nodes to disappear as my group runs up to them constantly? I thought it was a bug or perhaps a graphic issue to be honest, but this would explain that and why my group hasn't seen a rune all night long. Seriously, I am not joking when I say we haven't found one in at least the last five hours of questing. It's to the point that I'm regretting the points I put in enchanting.
Any consistency check by the software can be removed in the same way teleporting was added. It may not be trivial, but the guys who do this are professionals. Once you have access to the code on the hard drive/in the memory, you can rewrite it to your heart's content.
I relogged he is not there anymore fortunatellyuselessbass wrote: »great i better get on and see if i got 5 pets following me now i hope not that would really make this bad
ZOS_TristanK wrote: »Thank you for reporting the initial incident, folks, and for all of the additional information. Please be sure to report these characters in-game as well so that we can investigate.
uselessbass wrote: »the bots i saw literally teleport right to the node and then to the next nearest one they don't walk or anything else just teleport and harvest and they all got weird names like aaafffgg names that are random letters
Some times it's a bit hard, you just catch it out the corner of your eye, and there gone before you can take note.
These things are designed to be as sneaky as possible not to draw attention to themselves.
Don't you have any way of checking who is under the map? And when you catch them don't just ban the account, ban the IP, the registered address and the debit card.
The safer a game is, the more likely people are going to want to play, because the economy is safe.
You cant simply ban the IP in many cases because a lot of people, me included, still have dynamic IPs that are leased only a few days or while the router is switched on. Only option would be to ban the ISP but that would be bad for ZOS.
cheeser123 wrote: »
So cryptography doesn't exist? There are plenty of crypo protocols that, at least in theory, would prevent a user from faking certain types of validation.
Sad that this is happening. Can only blame the suckers that buy the service and actually give these poor soods a reason to do this.
LOL, and as the NSA has shown, at some point it has to be DECRYPTED and is vulnerable at that point.cheeser123 wrote: »
So cryptography doesn't exist? There are plenty of crypo protocols that, at least in theory, would prevent a user from faking certain types of validation.
If cryptography could be used to prevent changes to game code you have on your own computer, then software piracy would not exist.