Do not be taken in. If things appear too easy, or too convenient, they probably are and there is a catch. Try to think about not only what information you have – but also, who gave it to you, and what they might be trying to accomplish.
Month: July 2018 (Page 1 of 2)
Sanity week. Noodled around a bit. No serious coding work, not even bugfixes. Thorne posted a few photos from our daytrip to Staircase Rapids on Discord. I highly recommend both GMs and players to occasionally take the time to go out there, to whatever natural wonders are nearby. Lots and lots of inspiration.
A strange evil comes with the fog, so it’s said. Doors are closed, windows are shuttered and no one goes outside when even the faintest haze is visible…
Hello, fellow Portalites!
Sadly, I haven’t found as much good stuff this go ’round; there’s definitely some shiny, and some dice – some awesome dice! – but the cycle is rolling back down to famine. Don’t worry, I’m sure your pocketbooks will breath a sigh of relief… and then you’ll trip over the Dungeons and Doggies Kickstarter, and there will be wailing and gnashing of teeth… I know how this works.
I am sure I mentioned this before, but – be prepared to withdraw. In the balance of things, it is better to return healed and prepared, with the understanding that the opponents will be alerted, than it is to be dead and unable to retry. Whether it is acceptable to leave people behind to cover the retreat depends on the situation and the ethics of you and your companions.
Still working on the new codebase. About halfway through getting the auth system to behave and integrate with OpenID providers; starting to give thought to how to organize actual site functionality.
As a PSA, I would continue to recommend against shared-server (cloud hosting) arrangements, due to the prevalence of side channel attacks on modern CPUs. There’s, of course, the well-known Spectre class of attacks; a similar principle can be used to leak encryption keys when using a modern Intel or AMD CPU’s ability to perform AES crypto in hardware; below that layer, modern CPUs have what is called a “management engine” to perform system initialization and maintenance functions. As it turns out, the firmware powering these MEs is also vulnerable to attacks, including remote-exploitable arbitrary code execution attacks. All this leads me to believe that the course of wisdom in hosting arrangements is, at minimum, dedicated servers. Ideally, dedicated servers on a dedicated network, but I am unfortunately not aware of any providers offering that, shy of renting a rack, deploying one’s own hardware, and one’s own firewall.
It’s not the oddest thing about the whole arrangement, but the specific type of wine – and it has to be that specific type and vintner – has been consistent, no matter what else they’ve asked for..
Never let an intelligent opponent choose the battleground if you can avoid it. Facing, for example, a tribe of kobolds in a cavern is frightening enough. Facing the same kobolds in their lair, where they know every nook, twist and cranny and have set traps, snares, pits and ambushes, is terrifying.
Have had some chance to work further on the new codebase. Progress is being made – I am currently cleaning things up in the user authentication code.