They have different goals and utilize completely different techniques.
At most lossy techniques leverage lossless techniques (eg to compress non-perceptual binary headers) not the other way round.
They have different goals and utilize completely different techniques.
At most lossy techniques leverage lossless techniques (eg to compress non-perceptual binary headers) not the other way round.
This is not real encryption, it picks only one byte of shared secret and XORs it into the plaintext. Therefore, there are only 256 possible decryption keys to check, which is trivial.
Instead, you'd want to use the shared secret as a key to something strong and symmetric like AES.
Naming Baritone after Fit is actually a coincidence / joke, the repo github.com/cabaletta/baritone was the result of random brainstorming for something untaken. We only later realized it described Fit and thus added that to the readme :)
My girlfriend and I watch all the fitmc videos even though neither of us play minecraft, and love the ones detailing your insane tooling the most.
Ever since we watched the nocom one I’ve wondered what you do professionally - are you in the infosec space?
With the amount of math and computer science knowledge you put into your work I would guess more in algorithmic trading or something like that. No worries if you don’t want to answer, just curious!
It began with 2B2T being hit with a lag exploit, then that exploit being fixed in a 3-line patch - that patch subtly introduced another exploit that allowed the author to track the position of every player in the server at all times, down to the chunk.
I won't explain the whole video[0], but it details a story of gaslighting, 3 years of player data, and some really really impressive technical work, given this is all over a block game.
[0] https://youtu.be/elqAh3GWRpA
And while certainly not to the scale of Minecraft, Counter-Strike does have a (diminishing) sizeable community of cheaters that majorly play against each other, competing in technique and configuration, called Hack-vs-Hack (HvH).
Why wouldn't it be? You're not actually hosting a tracker in this case, only looking at incoming connections. And even if you do run a tracker, hard to make the case that the tracker itself is illega. Hosting something like opentrackr is like hosting a search engine, how they respond to legal takedown requests is where the crux is at, and whatever infra sits around the tracker, so police and courts can see/assume the intent. But trackers are pretty stupid coordination server software, would be crazy if they became illegal.
"I then started the tracker. After about an hour, it peaked at about 1.7 million distinct torrents across 3.1 million peers!"