Battlefield 3 thread - Server details in opening post -

Status
Not open for further replies.
I've been talking to one other person with our card on the Nvidia forums. He was having similar issues with BF3 (but also with other games like WOW too) but since flashing his bios he has been error-free.

Using GPU-z to monitor it appears that the bios flash changed the voltage on the card from a static level to something that fluctuates depending on card load. With no load it reports 0.95v and with full load it is 1.037v. Mine on the old bios is stuck on 1.012 regardless of what it is doing.

Be interesting to know if yours fluctuates in the same way, and what the readings are if you're OK to test?
 
So you clearly have never used xfire or steam if you think this is good.

Less alt tab nightmares? Dice are actively promoting alt tabbing because you can't see battlelog ingame.

In the context of me joining battlefield servers yes it is. If im playing the game I don't need to see battlelog.
 
So you clearly have never used xfire or steam if you think this is good.

Less alt tab nightmares? Dice are actively promoting alt tabbing because you can't see battlelog ingame.

It takes longer for me, have to start up Origin, log into battlelog, game has to load. The statistics have always been available through third party websites, they even offered estimations based on your trends.

You need to alt-tab a lot? (I've not tried BF3) that would be a bit of a game breaker for me as the way I have my SLI system setup alt-tabbing out of fullscreen can take awhile sometimes - I also know a lot of people who have trouble with alt-tabbing and games messing up :S
 
You need to alt-tab a lot? (I've not tried BF3) that would be a bit of a game breaker for me as the way I have my SLI system setup alt-tabbing out of fullscreen can take awhile sometimes - I also know a lot of people who have trouble with alt-tabbing and games messing up :S

Depends, I hardly ever alt tab as I join a server, play the game and then close the game to join another server.
 
Which, as you clearly know, requires you to do something to download that file. In BF3's case, the user would have to download an illegitimate plugin, obviously from an illegitimate site, which would execute an illegitimate local executable, which has been downloaded too.

Now, tell me whether you think the system or the person should be blamed for infecting their machine?

Machine. I have had infections before, on a system with a cautious user and adequate protection (paid for AV, regular malwarebyte scans, and spybot).

http://www.symantec.com/avcenter/reference/analysis.slapper.worm.pdf

Evidence of a worm that can infect through exploitation with no person to be blamed.

With DNS hijacking, it's easy to infect users.
 
Having to reload the game client to change servers/reconnect is a step backwards however.

It only loads map and game files related to the specific game session.

I press quickmatch, it loads the map, I play the game.

Edit: I quit the game, I press quickmatch, it loads the map, I play the game.
 
people are starting to get silly with using extremes to justify simply not liking the game :(

play it, like it or dont like it pretty simple really :p
 
Chrome or Firefox vulnerability (or lack thereof)

Not 3rd party plugins?

Why does connecting to Battlelog over SSL preclude the plugin from exploitation? One would hope it had some level of validation that the commands it is handling and sending to the local system to launch BF3 but that is nothing but an assumption. Maybe it does, maybe it does not?

You can already inject code client side to bypass Password requirements to join a server.

The point is that the Plug-In is more surface area for exploitation. How much more surface area depends on it's implementation. The password bypass code injection was worked out in what, no time at all? So as people learn more about the plug-in why is it inconceivable to believe that another, non authorised website can hook into the plugin and pass instruction to the local files which launch BF3?

One assumes the plugin is locked into BF3 files but again, assumption. Maybe DICE/EA coded it in a way to be able to dynamically launch whatever they want with a set of variables passed from browser to local system.

Why is this not seen as a potential issue.

Ideally we want to move towards a plug-in free browsing future. I use a small handful of plugins that are pretty much required for web browsing. Flash, Shockwave.

Installing and using more is not ideal personally. "It's the nature of the web so whatever" is the wrong attitude.

You under-estimate the potential for exploitation, or maybe more accurately - over-estimate the security implemented by the developers. Hell, there have been exploits in code using JPEG images!

I don't underestimate anything. I've worked for the past umpteen years in web development, whereas you are making lots of assumptions that are clearly based on no technical knowledge of the matter.
 
I don't underestimate anything. I've worked for the past umpteen years in web development, whereas you are making lots of assumptions that are clearly based on no technical knowledge of the matter.

So you are going on the record and stating the Plug-In used by Battlelog is infallible and unexploitable? By extension it is therefore impossible for any plug-in to be exploitable as without intimate knowledge of the one used by BatteLog all plugins must be equal from a security point of view?

It is impossible for an addition of a plugin to increase the surface area available for attack?

Okay.
 
Last edited:
So you are going on the record and stating the Plug-In used by Battlelog is infallible and unexploitable?

No. You seem to be the one that is obsessed with that.

What I am saying is that the additional danger posted by the battlelog website, including the plugin, is negligible.

edit: You've added extra stuff since I replied. I think I addressed the question in my first response though.
 
What evidence can you provide that the additional danger is neglible?

Are you saying it's impossible for the plugin to be created in a fashion that would allow a non-battlelog site to utilise it?

I agree, we would damn well hope it was implemented in a way that it could never happen and as a result the additional danger is indeed neglible. But unless you know something nobody else does about the PlugIn discussion on the potential for risk is valid.

I never said "OMG BATTLELOG IS A GATEWAY FOR TROJAN DOWNLOADERS" I merely indicated that the potential for risk was there, via a browser which would not be an issue in a native game client. I speculated on how long it might take for it to be exploited, to which the reply was "Never".

A discussion point on the potential dis-advantages on a Web based, Plugin method BF3 uses. Not scaremongering at all.
 
What evidence can you provide that the additional danger is neglible?

Are you saying it's impossible for the plugin to be created in a fashion that would allow a non-battlelog site to utilise it?

I agree, we would damn well hope it was implemented in a way that it could never happen and as a result the additional danger is indeed neglible. But unless you know something nobody else does about the PlugIn discussion on the potential for risk is valid.

I never said "OMG BATTLELOG IS A GATEWAY FOR TROJAN DOWNLOADERS" I merely indicated that the potential for risk was there, via a browser which would not be an issue in a native game client.

Your reaction is the typical hysterical reaction that developers see from users with a very tiny bit of technical knowledge being applied in the wrong way. It's kind of similar to the public hysteria you see over innoculations or food products (oh noes, MSG!).

I'm sorry that I've not been as polite as I could be in trying to point that out but as far as I'm concerned I think our (as in all BF3 players that want to complain about something) energies could be better spent on things that actually matter. The points about hit reg earlier were partially valid and there are lots of other issues, such as the functionality of Battlelog, that would be better to pay attention to.
 
What evidence can you provide that the additional danger is neglible?

I think you need to stop using the internet, or accept that using it increases "surface area" for exploitation/fraud, most things pose a thread if you extrapolate on the issue long enough, you just need to be realistic and maybe a little less speculative about the actual reality of the issue.
 
I think you need to stop using the internet, or accept that using it increases "surface area" for exploitation/fraud, most things pose a thread if you extrapolate on the issue long enough, you just need to be realistic and maybe a little less speculative about the actual reality of the issue.

Well said.
 
Status
Not open for further replies.
Back
Top Bottom