Bookmarks tagged Gaming
A self hostable game server that can connect to others instances using the ActivityPub federation protocol and offers a client API to play a city building and resource trading game.
This project is still in early stages of development.
This project is still in early stages of development.
Using built in microphones (which capture electromagnetic leakage) to cheat at games over discord (and other voice platforms)
"We show that built-in sensors in commodity PCs, such as
microphones, inadvertently capture electromagnetic side-
channel leakage from ongoing computation. Moreover, this
information is often conveyed by supposedly-benign chan-
nels such as audio recordings and common Voice-over-IP
applications, even after lossy compression.
Thus, we show, it is possible to conduct physical side-
channel attacks on computation by remote and purely passive
analysis of commonly-shared channels. These attacks require
neither physical proximity (which could be mitigated by dis-
tance and shielding), nor the ability to run code on the target
or configure its hardware. Consequently, we argue, physical
side channels on PCs can no longer be excluded from remote-
attack threat models.
We analyze the computation-dependent leakage captured
by internal microphones, and empirically demonstrate its effi-
cacy for attacks. In one scenario, an attacker steals the secret
ECDSA signing keys of the counterparty in a voice call. In
another, the attacker detects what web page their counterparty
is loading. In the third scenario, a player in the Counter-Strike
online multiplayer game can detect a hidden opponent waiting
in ambush, by analyzing how the 3D rendering done by the
opponent’s computer induces faint but detectable signals into
the opponent’s audio feed."
"We show that built-in sensors in commodity PCs, such as
microphones, inadvertently capture electromagnetic side-
channel leakage from ongoing computation. Moreover, this
information is often conveyed by supposedly-benign chan-
nels such as audio recordings and common Voice-over-IP
applications, even after lossy compression.
Thus, we show, it is possible to conduct physical side-
channel attacks on computation by remote and purely passive
analysis of commonly-shared channels. These attacks require
neither physical proximity (which could be mitigated by dis-
tance and shielding), nor the ability to run code on the target
or configure its hardware. Consequently, we argue, physical
side channels on PCs can no longer be excluded from remote-
attack threat models.
We analyze the computation-dependent leakage captured
by internal microphones, and empirically demonstrate its effi-
cacy for attacks. In one scenario, an attacker steals the secret
ECDSA signing keys of the counterparty in a voice call. In
another, the attacker detects what web page their counterparty
is loading. In the third scenario, a player in the Counter-Strike
online multiplayer game can detect a hidden opponent waiting
in ambush, by analyzing how the 3D rendering done by the
opponent’s computer induces faint but detectable signals into
the opponent’s audio feed."
"On November 15, 2001, Bungie released its legendary first-person shooter for the original xBox. As a longtime fan of Halo: Combat Evolved, I 'm creating a faithful demake for the Game Boy Color using GB Studio."
"Every modern game system from Nintendo has an iteration of the Super Smash Bros series, but old systems seem forgotten. Super Tilt Bro. is a homebrew for the NES porting the versus platformer style to our beloved system from the 1980's.
Let's go further and bring the new millennium to the NES. Integrating a Wi-Fi chip in the cartridge allows for online play."
Let's go further and bring the new millennium to the NES. Integrating a Wi-Fi chip in the cartridge allows for online play."