
Mephistocles
Red Frog Investments Blue Sky Consortium
|
Posted - 2009.12.10 20:52:00 -
[2]
Originally by: Kwint Sommer Are you confused by the word "macros" or simply the implementation/legality of them?
If it's the first case then may I introduce you to google's very useful "define" function. Linkage What do you know? The very first result is our definition.
What does that macro do? It automates the process of docking, assembling and boarding a ship, buying insurance, undocking and self destructing. Basically you just click through the process once, record your mouse inputs to a script, add in random variables to make each execution unique and then put in short delays and redundancy of clicking to account for any lag or other unanticipated client responses and suddenly you can destroy a couple hundreds ships per day without even being at your computer. Each instance will be unique and the only thing you're manipulating is the mouse so it's the definition of undetectable. Furthermore, CCP allows certain levels of automation such as that offered by the macro functions on the G15 keyboard. This could arguably be included in that and even if it's not there's strong historical precedent for CCP accepting these sorts of things. See macro miners.
To the mods: I sincerely believe that this does not constitute discussion of an exploit given it's similarity to the officially sanctioned G15's functions. If it does cross the line, my apologies, and I will happily remove the statement.
I'm well aware of the definition and your condescending tone is quite humorous. I think it's somewhat irresponsible to suggest people set up macros to automate tasks without first knowing if it is sanctioned by CCP.
EULA, section 7.a.(3):
(3) You may not use macros or other stored rapid keystrokes or other patterns of play that facilitate acquisition of items, currency, objects, character attributes, rank or status at an accelerated rate when compared with ordinary Game play. You may not rewrite or modify the user interface or otherwise manipulate data in any way to acquire items, currency, objects, character attributes or beneficial actions not actually acquired or achieved in the Game.
Your argument might hold some water, but then you go on to say that it could work even while you aren't at your computer definitely makes that an exploit.
|