Fragging: The Subscription Model Comes for Gamers

The video game industry is undergoing the same concerning changes we've seen before with film and TV, and it underscores the need for meaningful digital ownership.
Twenty years ago you owned DVDs. Ten years ago you probably had a Netflix subscription with a seemingly endless library.
Now, you probably have two to three subscription services, and regularly hear about shows and movies you can no longer access, either because they've moved to yet another subscription service, or because platforms are delisting them all together.
The video game industry is getting the same treatment.
While it is still common for people to purchase physical or digital copies of games, albeit often from within walled gardens like Steam or Epic Games, game subscriptions are becoming more and more common.
Like the early days of movie streaming, services like Microsoft Game Pass or PlayStation Plus seem to offer a good deal.
For a flat monthly fee, you have access to seemingly unlimited game choices.
Notably, this is from a company which had developed five non-mobile games last year, hoping users will access them and older games through a $17.99 per month subscription; that is, $215.88 per year.
This fragmentation of the video game subscription market isn't just driven by greed, but answering a real frustration from users the industry itself has created.
Gamers at one point could easily buy and return games, they could rent games they were only curious about, and even recoup costs by reselling their game.
With the proliferation of DRM and walled-garden game vendors, ownership rights have been eroded.
Reselling or giving away a copy of your game, or leaving it for your next of kin, is no longer permitted.
The closest thing to a rental now available is a game demo or playing a game within the time frame necessary to get a refund.
These purchases are also put at risk as games are sometimes released incomplete beyond this time limit.
Developers such as Ubisoft will also shut down online services which severely impact the features of these games, or even make them unplayable.
DRM and tightly controlled gaming platforms also make it harder to mod or tweak games in ways the platform doesn't choose to support.
Mods are a thriving medium for extending the functionalities, messages, and experiences facilitated by a base game, one where passion has driven contributors to design amazing things with a low barrier to entry.
A model wherein the player can only access these aspects of the game in the ways the manufacturer supports undermines the creative rights of owners as well.
With publishers serving as intermediaries, game developers are left either struggling to reach their audience, or settling for a fraction of the revenue they could receive from traditional sales.
We need to preserve digital ownership before we see video games fall into the same cycles as film and TV, with users stuck paying more and receiving not robust ownership, but fragile access on the platform's terms.


This Cyber News was published on www.eff.org. Publication date: Wed, 24 Jan 2024 00:43:04 +0000


Cyber News related to Fragging: The Subscription Model Comes for Gamers

Fragging: The Subscription Model Comes for Gamers - The video game industry is undergoing the same concerning changes we've seen before with film and TV, and it underscores the need for meaningful digital ownership. Twenty years ago you owned DVDs. Ten years ago you probably had a Netflix subscription ...
9 months ago Eff.org
Best of 2023: Diamond Model of Intrusion Analysis: A Quick Guide - Any intrusion into a network calls for a thorough analysis to give security teams cyber intelligence about different threats and to help thwart similar future attacks. Effective incident analysis has long been held back by uncertainty and high false ...
10 months ago Securityboulevard.com
How to detect poisoned data in machine learning datasets - Almost anyone can poison a machine learning dataset to alter its behavior and output substantially and permanently. With careful, proactive detection efforts, organizations could retain weeks, months or even years of work they would otherwise use to ...
9 months ago Venturebeat.com
Here's How to Make Your Gaming Experience Safer - Over 1 billion people worldwide regularly play online games. The emergence of high-quality games, multiple gaming mediums, and online communities has prompted gamers to overlook the dark side of online gaming. If you play games online on your ...
10 months ago Cybersecurity-insiders.com
Protect AI Unveils Gateway to Secure AI Models - Protect AI today launched a Guardian gateway that enables organizations to enforce security policies to prevent malicious code from executing within an artificial intelligence model. Guardian is based on ModelScan, an open source tool from Protect AI ...
9 months ago Securityboulevard.com
How machine learning helps us hunt threats | Securelist - In this post, we will share our experience hunting for new threats by processing Kaspersky Security Network (KSN) global threat data with ML tools to identify subtle new Indicators of Compromise (IoCs). The model can process and learn from millions ...
1 month ago Securelist.com
Establishing Reward Criteria for Reporting Bugs in AI Products - At Google, we maintain a Vulnerability Reward Program to honor cutting-edge external contributions addressing issues in Google-owned and Alphabet-subsidiary Web properties. To keep up with rapid advances in AI technologies and ensure we're prepared ...
10 months ago Darkreading.com
CVE-2019-6332 - A potential security vulnerability has been identified with certain HP InkJet printers. The vulnerability could be exploited to allow cross-site scripting (XSS). Affected products and versions include: HP DeskJet 2600 All-in-One Printer series model ...
4 years ago
Securing AI: Navigating the Complex Landscape of Models, Fine-Tuning, and RAG - It underscores the urgent need for robust security measures and proper monitoring in developing, fine-tuning, and deploying AI models. The emergence of advanced models, like Generative Pre-trained Transformer 4, marks a new era in the AI landscape. ...
10 months ago Feedpress.me
Top LLM vulnerabilities and how to mitigate the associated risk - As large language models become more prevalent, a comprehensive understanding of the LLM threat landscape remains elusive. While the AI threat landscape changes every day, there are a handful of LLM vulnerabilities that we know pose significant risk ...
9 months ago Helpnetsecurity.com
How Hackers Interrupted GTA 5 Online Gameplay on PC - Recently, a cyber-attack on Grand Theft Auto 5 Online on PC caused an interruption to thousands of players’ gameplays. The game was completely taken offline and players couldn’t even access the main gameplay menu. The attack caused an uproar ...
1 year ago Hackread.com
Spy Trojan SpyNote Unveiled in Attacks on Gamers - The SpyNote Trojan, camouflaged as a mod for the game Roblox, has been observed targeting Android users. This mobile malware can log keystrokes, record screens, stream video from phone cameras and impersonate Google and Facebook applications to ...
11 months ago Infosecurity-magazine.com
CVE-2016-4863 - The Toshiba FlashAir SD-WD/WC series Class 6 model with firmware version 1.00.04 and later, FlashAir SD-WD/WC series Class 10 model W-02 with firmware version 2.00.02 and later, FlashAir SD-WE series Class 10 model W-03, FlashAir Class 6 model with ...
7 years ago
Addressing Deceptive AI: OpenAI Rival Anthropic Uncovers Difficulties in Correction - There is a possibility that artificial intelligence models can be trained to deceive. According to a new research led by Google-backed AI startup Anthropic, if a model exhibits deceptive behaviour, standard techniques cannot remove the deception and ...
9 months ago Cysecurity.news
Protecting User Privacy by Removing Personal Data from Data Broker Sites - As part of its new subscription service model, Mozilla Firefox is offering its users the possibility of finding and removing their personal and sensitive information from data brokers across the internet. To eliminate their phone numbers, e-mail, ...
8 months ago Cysecurity.news
CVE-2023-23629 - Metabase is an open source data analytics platform. Affected versions are subject to Improper Privilege Management. As intended, recipients of dashboards subscriptions can view the data as seen by the creator of that subscription. This allows someone ...
1 year ago
Get a Lifetime of 1TB Cloud Storage for Only $80 With FolderFort - TL;DR: Get speedy, secure and user-friendly cloud storage with a lifetime subscription to the FolderFort 1TB Storage Pro Plan - it's currently on sale at 68% off for just $80. Cloud data storage is one of the most useful and convenient developments ...
4 months ago Techrepublic.com
Improving Software Quality with the OWASP BOM Maturity Model - With his years of work on the CycloneDX standard, Springett understands the issues holding back SBOM usage-particularly when it comes to standardization, dependency tracking, and verification. Not to mention, he also chaired OWASP's Software ...
8 months ago Securityboulevard.com
CVE-2019-19118 - Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be ...
4 years ago
JFrog, AWS team up for machine learning in the cloud - Software supply chain provider JFrog is integrating with the Amazon SageMaker cloud-based machine learning platform to incorporate machine learning models into the software development lifecycle. The JFrog platform integration with Amazon SageMaker, ...
9 months ago Infoworld.com
Adapting Security to Protect AI/ML Systems - As companies race to integrate AI and machine learning into every facet of their operations, they are also introducing new security and risk challenges. While some of the same risks that apply in traditional IT security continue to be relevant in ...
9 months ago Darkreading.com
The 7 Core Pillars of a Zero-Trust Architecture - The zero-trust framework is gaining traction in the enterprise due to its security benefits. Organizations are increasingly adopting a zero-trust model in their security programs, replacing the traditional perimeter-based security model. The ...
5 months ago Techtarget.com
Is Hybrid Play Leveling the Playing Field for Online Video Gaming? - As technology continues to evolve, the market for online video gaming has grown exponentially. With the advent of hybrid play, we have seen the emergence of digital console gaming and increasing proficiency in a variety of gaming platforms. This ...
1 year ago Welivesecurity.com
Anthropic releases Claude 3 Haiku, an AI model built for speed and affordability - Join leaders in Boston on March 27 for an exclusive night of networking, insights, and conversation. San Francisco-based startup Anthropic has just released Claude 3 Haiku, the newest addition to its Claude 3 family of AI models. Haiku stands out as ...
7 months ago Venturebeat.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)