poppopret
poppopret
poppopret

How is Hollywood fame that much different than Youtube fame? At this point in time there is a clear difference, but I have a feeling that this line will continue to blur as we move forward. Partitioning these two worlds is arbitrary; they are still just famous people. I don’t understand this mentality where people say

I adore Tim and Eric’s comedy style. Checkout “Cinema on Cinema” season 2: ep 202. ‘A good day to die hard.’ It is a bit different, but maybe it will redeem Tim a bit for you. Also, I am currently obsessed with the Eric Andre Show. Look up some clips if you have not already seen it (it is part produced by Tim and Eric

Ahh that makes more sense. I suppose the rendering is highly coupled with with the precision which makes refactoring the code non-trivial. That did not occur to me initially.

I gotcha. Thanks for the link. I appreciate it.

It is a pretty common practice in the industry to use all kinds of middleware for large applications to handle different tasks. Game devs. do this all the time. I don’t see what the issue is that they are not using a “full game engine.” Cloud Imperium (CI) using custom fit solutions for their game in terms of the

Don’t say that it cannot be done. There are image parser, video parser, and audio parser bugs found every day. It is likely that they are using open source libraries but that does not mean they are secure. You can inject code into any type of file (byte code could sit in the image as pixel data for example), but you

I would say given the data on a person’s ps4 it is probably not worth the trouble. Personally identifiable information is a dime a dozen. The going price for that info is cheap. Even entire profiles are cheap. I myself don’t work on that side of the fence but I have listened to security talks about it. Unless you are

Well in theory you could include a payload in a image. Image parsers tend to be full of bugs so you could probably find a memory corruption bug in whatever image library they are using. You could also include code in the texture file so that when you get control of execution you point it at code in the image file

My friend just asked me about this exact topic. This issue is fairly complex so let me break it down. There are a few ways an attacker could go about this. They could create their own mod and try to make it popular (too much variability so this is not a good option). They could break into a modder’s account and drop