Ardennesss wrote:You didn't step in when Shubla posted that my client had a keylogger, that post is still not removed. Is the implication that the forum report feature is pointless?
Clearly that was a mistake. Yet I haven't removed the above post, either. It seems you handled the situation well enough and shubla didn't spam the issue. As I understand it, he did spam up your Discord channel about it resulting in shubla being kicked. Keyloggers and other shenanigans from private clients made public have been an issue in the past, and so I saw it as a valid request. Did you send him a copy of the source as required by the GPL (assuming shubla made a request for the source and wasn't just trolling the thread)? I'm guessing no even if the request was made. From what I gather (going from memory) of the conversation, the request was made, if not directly, than at least it was obvious to me that a request to "read the code" for proof was being asked. Given what we've seen of shubla, it probably would have just been to stick the mods into his own client that he didn't already have, but that's kind of the point of open source, isn't it?
boshaw wrote:Technically isn't it that you only have to make public the source code to those you distribute the software to?
My understanding is that if it is released as open source under GPL, all derivative work must also retain such licensing, as the publisher of a modification can't take away that property. Maybe I'm just getting my various public licensing agreements mixed here, but pretty sure I read that about GPL somewhere in a comparison with some of the other public licensing. The GPL license itself never actually mentions "open source," just public, which isn't necessarily the same thing in legal terms, but does include open source.
The way I see it, the whole point of being open source is that A) factions and power gamers are going to hack the client, anyway, and B) having it open source at least gives others that can read the code a chance to see what is actually in there and changes that have been made. Yes, there are other ways of detecting things like keyloggers, but good hacks can hide themselves from those detection methods, too.
Opinions expressed in this statement are the authors alone and in no way reflect on the game development values of the actual developers.