this post was submitted on 26 Dec 2023
1030 points (98.0% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54669 readers
417 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 

The full GTA V source code has been leaked The leak contains GTA V source code and stuff from Bully 2 and GTA VI Leaked in a discord server by a random British guy in the 360 modding community known to get sued by Rockstar multiple times

"Now i am expecting a open source version of gta to arrive soon on linux natively . Tired of playing supertuxcart."

Here is the source. Another one.

you are viewing a single comment's thread
view the rest of the comments
[–] Cinner@lemmy.world 2 points 11 months ago* (last edited 11 months ago) (2 children)

He hacked rockstar at a hotel, where he was left with no computers or phones, only to find that the TV had a chromecast, which he used to buy a phone and a keyboard (presumably by selling his monero).

You sure are making a lot of assumptions here and have some very interesting takes. Can you tell me how this would be done without a way to modify the Chromecast?

[–] dannym@lemmy.escapebigtech.info 1 points 11 months ago

I have not made any assumptions, this has been shared multiple times in different articles which I did not write. As for the Chromecast, I misremembered, it was an Amazon Firestick.

[–] bradorsomething@ttrpg.network -1 points 11 months ago (1 children)
[–] Cinner@lemmy.world 2 points 11 months ago

Why link an irrelevant article from 2005 about IR?

The only hardware an intruder needs is a laptop running Linux, an infrared transmitter and a USB TV tuner. Laurie said the attack can also be performed using the infrared port built into many laptops.