1033
submitted 10 months ago* (last edited 10 months ago) by mr_right@lemmy.dbzer0.com to c/piracy@lemmy.dbzer0.com

The full GTA V source code has been leaked The leak contains GTA V source code and stuff from Bully 2 and GTA VI Leaked in a discord server by a random British guy in the 360 modding community known to get sued by Rockstar multiple times

"Now i am expecting a open source version of gta to arrive soon on linux natively . Tired of playing supertuxcart."

Here is the source. Another one.

you are viewing a single comment's thread
view the rest of the comments
[-] 520@kbin.social 16 points 10 months ago

His career in white hat cybersecurity is shot to fuck. No one will trust him enough after this

[-] Anomalous_Llama@lemmy.world 11 points 10 months ago

Well, considering the UK is not interested in helping him, and you’re probably right, we should perhaps be more concerned with Russia or a similar country picking him up for state sponsored cyberattacks or some shit.

Kid seems to be in it for the chaos and notoriety. That could cause quite a bit of harm in the right state environment.

[-] TheDarkKnight@lemmy.world 3 points 10 months ago

Mostly true in normal cases. If you’re really talented there is a market for you, always. Idk if he falls in the category, and most cyber criminals have no shot at white hat anything but given his age and his feats I think he might be an exception.

[-] 520@kbin.social 8 points 10 months ago* (last edited 10 months ago)

Mostly true in normal cases. If you’re really talented there is a market for you, always.

In this case, that market is the black market. In the regular market, no head of security wants to be responsible for a potential critical breach by hiring such a wild cannon.

His only possible path would have been to show remorse after the attacks. He shot that in the ass, or at least made his job much harder in that respect, by pulling another attack while in police custody.

[-] WarmApplePieShrek@lemmy.dbzer0.com 1 points 10 months ago

In the regular market, no head of security wants to be responsible for a potential critical breach by hiring such a wild cannon.

Remember when a company's head of security was fired and prosecuted for ordering a pentest against his own company, which is a normal thing that good heads of security do?

[-] 520@kbin.social 1 points 10 months ago
  1. running unauthorised pentests does indeed get people fired. Along with getting their managers in hot water for letting their pentesters be loose cannons. And if they're attacking someone else while on company time, the company can be in serious legal trouble too.

  2. it is rather customary for heads to roll when critical data is leaked as part of an insider attack, especially when said attack was enabled by negligent practices.

Just incase you've forgotten that randomly attacking people and leaking data is this kid's MO.

this post was submitted on 26 Dec 2023
1033 points (98.0% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54390 readers
821 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS