Go to the content

FGR*

Full screen

FGR* Blog

April 3, 2011 21:00 , by Unknown - | No one following this article yet.

Rainbow Six Patch Addresses Spawn Killing, Cheating, Ranked Matches

March 29, 2016 21:05, by FGR* Blog

Rainbow Six Siege on PC will receive another patch on March 30, and it comes with balance changes, improvements, and bug fixes. With this patch, Ubisoft hopes to stop spawn killing, improve ranked matchmaking, and prevent cheating.

Ubisoft posted the patch details on it forums today. The developer has added more obstacles to prevent spawn killing, such as a new block of ice on the Yacht map and an advertisement panel in the Bank. Lag compensation has also been improved to give players with lower ping levels the advantage against those with higher pings.

Ranked matchmaking should be improved, though Ubisoft says it’s “working on several iterations” to make it better. The studio is making it so ranked matches only start when there are 10 players in the lobby. Ubisoft is looking at removing the UI and adding an “Abandon system” to prevent people from leaving ranked lobbies after seeing their opponents’ statistics.

The developer has also expanded its criteria for identifying potential cheaters, and players identified as cheaters will be removed from the match immediately and suspended for as little as five minutes or potentially forever.

Weapon balances have been made and will include the falloff damage of Frost’s Super 90 Shotgun beginning earlier, which previously started at five meters and will now begin at 3.5. Additionally, the destruction caused by Buck’s Skeleton Key has been enhanced to allow for quicker vaulting and killholes. Lastly, the SMG-11’s recoil has been increased.

The patch comes to PC tomorrow, March 30. The tentative date for consoles to receive the patch is April 5.

You can check out the full list of fixes below:

Gameplay Fixes

  • The incorrect amount of remaining health is displayed for the victorious Operator when a defeated player is viewing the KillCam replay. – FIXED
  • Idle players on a team will receive an idle kick from the match if the other team quits during Preparation Phase. – FIXED
  • Players are able to clip through unbreakable walls by running at a wall and lifting a gadget in front of them at the last second before hitting the wall. – FIXED
  • Thermite can’t place an Exothermic Charge on a damaged wall with a hole big enough to fit the charge. – FIXED
  • Montagne can shoot before finishing the animation for unextending the shield. – FIXED
  • Parts of Glaz’s scope will disappear while entering ADS mode. – FIXED
  • Sledge’s Breaching Hammer has a low and delayed controller rumble when used. – FIXED
  • Sometimes the drones’ black and white filter is overridden by Mute’s colored jammer effect. – FIXED
  • Players are rewarded with Renown and XP if the other team quits the session before playing at least 2 rounds. – FIXED
  • Terrorist AI end up in a loop between evade and idle reaction for every damage tick received from poison gas. – FIXED

Level Design Fixes

Wall Reinforcements

  • We have made some improvements to the placement of wall reinforcements to prevent gaps in some locations. We are working on fixing all inconsistencies in barricades for future updates, but patch 2.3 addresses a lot of these.

Hereford

  • When the hostage is in the Kitchen spawn point just below the trap door, it can be killed by accident when using a Breach Charge. – FIXED

Bank

  • Character models can remain stuck behind some objects at the end of the tunnel in the Exterior Sewer Area. – FIXED
  • Breach Charges will clip through a wallboard in the 1st Floor -Electrical Room. – FIXED

House

  • Players can shoot through the non-destructible walls of the jacuzzi area in Backyard spawn point. – FIXED
  • Drones can fall through the environment if thrown in the Exterior Side Street area. – FIXED

Yacht

  • Defenders can easily get into a good shooting position over the attackers that spawn at the Snow Mobile location on Yatch. – FIXED
  • Moved hostage position in Engine to avoid players from being stuck in a specific condition. – FIXED
  • The objective area doesn’t cover the entire objective point at 3F Casino. – FIXED
  • Drones have no collision with the cupboard located on the 2nd Floor Staff Dormitory. – FIXED
  • Operators can remain stuck behind the hostage when moving behind it at the engine spawn point. – FIXED
  • Players can fall through the map if they fall in the water near the Zodiac spawn point and walk over the glacier that is next to the spawn location. – FIXED
  • Players can get stuck under the lifeboat located on the West Deck. – FIXED
  • Players can remain stuck after vaulting over the yacht’s edge and snow blocks near the Snow Mobile spawn. – FIXED
  • Drones have no collision with the couch in the Cockpit spawn point. – FIXED
  • Players can get stuck in-between the chairs located on the 2nd Floor Boreal Sub Room. – FIXED

Kanal

  • Drones can’t jump over the water near the garage’s side. – FIXED
  • Operators can vault on the boat and float in the air. – FIXED

Consulate

  • Moved the Flares in the front of the building, to more accurately represent the extraction trigger zone.

Online Fixes

  • [Ranked] There is no reconnect prompt after the player quits a Multiplayer Ranked session. – FIXED
  • Players are unable to reconnect if they lose connection to a dedicated server Custom Match – FIXED
  • After starting a PVP or PVE session error 2-0x0000001A will be received by friends when attempting to accept a party invite. – FIXED
  • Players in a party will not be pulled into the matchmaking lobby if the party leader quits a casual match lobby and enters a ranked lobby. – FIXED
  • Players can receive error 2-0x00000068 when accepting a party invite. – FIXED

UI & HUD Fixes

  • Players receive unnecessary Preparation Phase warning when moving too close to barricaded doors and windows. – FIXED
  • There is no constant visual feedback alerting the player about the contested area in secure area game mode. – FIXED
  • Wrong objective message is displayed on HUD after the Preparation Phase when defending in Defuse Bomb mode. – FIXED
  • The Cancel Mute option is not displayed if the muted player doesn’t have a microphone connected. – FIXED

Animation & Sound Fixes

  • Players in a squad could lose voice chat functionality after the squad leader had left. – FIXED
  • Sound randomly cuts out and then back in. – FIXED
  • Players can lose all sound effects for the duration of one round and then hear drone sounds playing constantly. – FIXED
  • While sprinting with a shield, the shield animation doesn’t match 3rd person animation and sound effects. – FIXED
  • The visual effects, such as a flashbang, from the previous session will “stick” and persist through any situation or session. – FIXED
  • The Silencer for the C8-SFW will at times not have any audio functionality for nearby players. – FIXED

Spectator Mode Fixes

  • All ballistic shield operators being spectated will have another player’s ammo displayed under shield icon. – FIXED
  • Glaz’s Aim Down Sight (“ADS”) animation is not working as intended for spectators – FIXED
  • UI disappears and fades back in slowly when spectating a flashed player and switching to one that isn’t. – FIXED
  • The damage on the shield’s glass is not replicated for spectators in support mode. – FIXED
  • The Names, Defuser, and objective icons appear under the “Floors” UI when spectating. – FIXED
  • “Invalid Device” text is displayed for unassigned Spectator Cam key bindings. – FIXED

Miscellaneous Fixes

  • The Alpha Team Uplay action is not unlocked after completing 50 Ranked matches. – FIXED
    • If a player experienced this bug before Season 1 (patch 2.0) and has some Ranked progress, they may still experience this issue. However, the issue should be resolved after playing a few more Ranked games.
  • The Report Player button disappears after the player uses it, instead of showing a checked box. – FIXED
  • Some settings are grayed out when the player duplicates a match in Custom matchmaking. – FIXED
  • Missing visual feedback when reporting suspicious behavior while in the lobby or after action report. – FIXED
  • The subsequent match in a Custom Match playlist is not chosen when the players are returned to the lobby. – FIXED

Source link

The FBI Now Says It May Crack That iPhone Without Apple’s Help

March 29, 2016 21:00, by FGR* Blog

Four years ago, an Apple patent surfaced that outlined how the consumer electronics company might become something called an MVNO. Rumors to that effect have persisted for years, most recently resurfacing this week at Business Insider. Apple swatted the latest aside, telling CNBC that it hasn’t discussed and isn’t planning anything of the sort. And that’s a shame, because it absolutely should.

MVNO may sound like an obscure pharmaceutical stock ticker symbol, but it stands for “mobile virtual network operator,” which is admittedly still pretty inscrutable. In practice, though, it’s very straightforward, explains telecom industry analyst Jeff Kagan.

“An MVNO is simply a reseller,” says Kagan. “It’s a company who strikes up an agreement with a wireless network to sell wireless service without owning their own networks.”

Think of it as Costco, but for wireless service. In the same way that your favorite bulk toilet paper provider repackages name-brand cereal for its Kirkland Signature private label, MVNOs like Republic Wireless (Sprint) and MetroPCS (T-Mobile) are simply selling you access to a larger carrier’s network, often for less than their affiliated providers charge.

Take, for instance, Straight Talk, an MVNO owned by TracFone and available in Walmart retail locations. Straight Talk piggybacks on both GSM (T-Mobile, AT&T) and DCMA (Verizon, Sprint) networks, while offering an unlimited talk, text, and data plan for $45 per month, a significant discount compared to any of the big four carriers supplying the bandwidth. It’s able to do so in part because it’s bought up wholesale access to those networks on the cheap, and in part because the scale enabled by its Walmart partnership makes thin margins more feasible.

The other way MVNOs make money? No overhead. “They have no network to invest in, so there’s very little capital expense” explains Iain Gillott, president of iGR, a research firm that specializes in the wireless and mobile industry. That freedom from having to build and maintain massive networks also enables MVNOs to seek out very specific audiences. “Since they do not have to invest in networks, they can afford to target niches,” Gillott goes on. “Prices are usually better, or at least they offer more value for similar dollars, but often MVNOs will not offer the same range of services.”

Republic Wireless and Straight Talk and MetroPC may be the best-known MVNOs (TracFone alone has around 30 million subscribers), but the one that may be most relevant to Apple-oriented speculation is one of the smallest, and most recent: Google’s Project Fi.

High-Fi

Google launched Project Fi this past April. Next to more established MVNOs, it operates on an infinitesimal scale, available only on the company’s flagship Nexus 6 smartphone. What Project Fi lacks in breadth, though, it makes up for in innovation. More importantly, it provides a blueprint for any similar ambitions Apple might have.

Project Fi offers a few features that are hard to come by among traditional carriers. Chief among those, and most common to MVNO, is a more competitive pricing scheme. In this case, you pay $20 per month for unlimited talk, text, Wi-Fi tethering, and international coverage, and then an additional $10 per month for each GB of data you use. Crucially, though, you only pay for what you actually consume; chew through 1.5GB in a month you paid for 2GB, and you get $5 credited back to your account.

The real key to Project Fi, though, is that Google bought up network access from both T-Mobile and Sprint. Whichever network is more reliable where you are in that moment, that’s the one to which your phone will connect. “Not all carriers are good in all places,” explains Gillott, “but in each market, a few carriers are very good. The problem is that they vary.” By hedging its network bets—and offering a seamless Wi-Fi to cellular handoff—Project Fi phones are better steeled against dropped calls and fuzzy connections than phones that rely on a single network.

Sounds good! But why so small? In part because it’s an entirely new business for Google, and a small pilot program helps determine whether it’s worth a more aggressive push. It also, though, doesn’t necessarily need huge scale to be effective. “I look at Google Fi in the same way as Google Fiber,” says Gillott, referencing Google’s equally disruptive, small-scale broadband play. “Has it had any operating impact on AT&T, Verizon, and the cable companies? No, but the fear of Google Fiber did make all the broadband folks sit up and invest in their networks. I get 100 Mbps from TWC for the same price I used to pay for 15 Mbps.” Similarly, the mere threat of an expanding Project Fi could potentially effect change among the big four U.S. carriers.

It’s worth spending so much time on Project Fi because this is the exact lens through which Apple would be looking at an MVNO of its own: A chance to reshape the unpopular industry on which its most important product relies.

Apple the MVNO

“Apple has been playing with the MVNO idea for years,” says Forrester Research analyst Dan Bieler. “Ultimately, it is about a power struggle with the telcos.”

The impetus for that kind of grappling should be apparent to anyone who’s ever spent time on hold with Verizon, or waded through fine print mined with early termination fees. Apple is popular. Carriers are not. So why cede so much of your customer’s iPhone experience to the latter?

It’s not a small gap, either. In the 2014 American Consumer Satisfaction Index, Apple ranked 15th overall, and just narrowly second (behind Amazon) among technology companies. AT&T, T-Mobile, and Sprint all sit near the bottom, while Verizon managed to split the difference, likely thanks to its perennially reliable coverage.

Selling iPhones, then, must often feel like serving filet mignon in an Arby’s. No wonder Apple has been rumored to seek a way out. Especially one with such a relatively low barrier to entry.

“You can get into the wireless business overnight at low cost by being an MVNO and seeing if it works,” says Kagan.

If and when Apple changes its mind, you could expect it to follow the Project Fi model with a few improvements. It could tap into all four major U.S. network providers, providing even more comprehensive coverage than Google’s two-network MVNO. Apple could leverage its existing customer service chops to ease those common carrier pain points. It already has your credit card on file, which would streamline the billing process.

Most important, though, it would have the opportunity to reshape the arcane pricing labyrinth that makes negotiating the current cellular landscape such a pain.

“The more Apple can control the customer relationships, data collection, and revenue generation, the greater its influence will be… the emerging digital ecosystems,” explains Bieler. “I think Apple’s real intention is to force the traditional telcos to offer more competitive data and voice plans.”

And as counterintuitive as it may sound, the entrenched carriers may very well let it. “They’re frenemies,” says Kagan. “It’s the way the industry operates. On the one hand you’re partners, on the other hand you’re competitors. It’s been that way forever.”
It’s safe to assume that the maker of the world’s most popular high-end smartphone has plenty of leverage. You don’t even really need to assume, though; Apple’s already introduced a carrier-rankling iPad SIM card that lets you switch between AT&T, T-Mobile, and Sprint data plans at will. There’s been some blowback (if you purchase an iPad direct from the carrier, the SIM will likely come locked down), but clearly not enough to dissuade Apple from pushing forward.

Apple may be waving off the idea of an MVNO for now. It shouldn’t. Not if it wants what’s best for Apple, for its customers, and for anyone with a data plan.

Go Back to Top. Skip To: Start of Article.


Source link

Uber Will Pay $10,000 ‘Bug Bounties’ to Friendly Hackers

March 29, 2016 19:27, by FGR* Blog

Uber’s business model is based on a simple notion: Why employ drivers full time when you can hire them more efficiently as freelancers? It’s no surprise, then, that the company’s come to the same conclusion on cybersecurity, recruiting an army of gig-economy hackers who are paid by the exploit instead of by the hour.

On Tuesday, Uber announced that it’s officially launching a “bug bounty” program that will pay independent security researchers thousands of dollars in rewards for finding hackable bugs in its apps and websites. That makes the ride-sharing firm the latest tech giant to adopt the strategy of crowdsourcing the auditing of its code to shore it up against less benevolent hackers. Finding a bug that could deface Uber’s homepage or expose users’ email addresses earns $5,000, for instance, while one that could fully take over Uber accounts or run malicious code on an Uber production server can earn as much as $10,000.

But Uber, which is launching its program with the help of the bug-bounty-focused firm HackerOne, has gone a step further than older programs run by Google, Facebook and Microsoft: It’s trying out a bug bounty “loyalty system” that gives hackers bonuses for repeated bug discoveries in Uber’s platform. It’s also promised to release a “treasure map” for bug bounty hunters designed to guide them toward potential vulnerabilities in the site—mapping out the company’s code to make bug hunting as efficient as possible.

The idea, says Uber head of product security Collin Greene, is to incentivize security researchers to “go deep” in Uber’s code, instead of flitting between different companies’ bug bounty programs searching for low-hanging fruit. And the “treasure map” is designed to share with external hackers the same systems architecture information that internal staff have access to, a move that can save bug hunters weeks of recon time and help them start uncovering serious vulnerabilities in the company’s code. “We’re saying ‘here are the different portions of the website, the mobile apps and how they work, and the technologies underneath them. If I were a security researcher, here’s where I’d look,’” says Greene. “By giving them a treasure map of the structure of our system, they can spend their time instead looking for really subtle bugs.”

All of that might sound like a particularly aggressive invitation for hackers, and one that could backfire. But Uber argues that it’s not revealing anything in its treasure map that isn’t already public. And given that information is already discoverable by serious hackers incentivized by criminal profits, better to offer it to those seeking to inform the company of its vulnerabilities, too. “It’s in our best interest to make sure that the right people with the right intentions—security researchers who are going to look at our code and report bugs directly to Uber—have the information in an easy to understand way,” Greene says. “We believe a more transparent program will be a more successful [one].”

Uber’s bug bounty program isn’t as new as it sounds. It’s already paid hackers more than a hundred bug bounties in a private beta version of the program that it’s quietly run for a year. And it’s been on a security hiring spree that includes experienced bug bounty managers: Both Greene and Uber chief security officer Joe Sullivan were hired from Facebook, where Greene formerly oversaw a bug bounty program that’s paid out millions of dollars. In fact, Uber’s new features show just how far the culture of bug bounties has evolved: Major tech firms are now competing for independent hackers’ attention—and not just with money, but in Uber’s case, by making the process of bug discovery more efficient. “We want to make this a bug bounty program that researchers adore,” says Greene.

One step Uber has yet to take, however, is to extend its bounties to its actual cars. For now, the program only applies to bugs found in its websites and apps for riders and drivers. That’s a predictable limitation, of course, given that Uber doesn’t actually own drivers’ vehicles. But Uber got a taste of automotive cybersecurity flaws over the summer when a group of researchers at the University of California at San Diego found a vulnerability in a certain Internet-connected insurance dongle offered to Uber drivers; the dongle’s Internet connection allowed the researchers to access vehicles’ internal CAN networks, turning on windshield wipers or cutting their brakes.

Other companies are beginning to experiment with automotive bug bounties. Tesla’s bounty program includes hackable flaws in its vehicles, and GM recently launched a vulnerability disclosure program, albeit one without monetary rewards. But that’s not to say Uber isn’t taking the risk of vehicle cybersecurity seriously, too: in August it hired a pair of hackers who remotely hacked a Jeep over the Internet (at one point while I was driving it on a highway) to show they could cut its transmission and brakes. It may not be long before Uber pays out bounties for hacking not only the computers that run its websites, but the ones on wheels, too.

Go Back to Top. Skip To: Start of Article.


Source link

Postagens em inglês

March 29, 2016 18:38, by FGR* Blog

Vocês perceberam (lógico) que o blog está com muitos posts em inglês (magazines, game news, forense e segurança, etc), mas isso não significa que irei um dia somente postar em outro idioma. Também creio que o idioma não seja uma barreira para meus leitores, porém prometo não postar em archi (um dos 30 idiomas do Daguestão), tofa (falada por menos de 30 pessoas na Sibéria) ou rotokas (somente 12 letras em seu alfabeto).

Forte abraço e do svidaniya.



ImagineFX – May 2016

March 29, 2016 18:21, by FGR* Blog

ImagineFX is the only magazine for fantasy and sci-fi digital artists. Each issue contains an eclectic mixture of in-depth workshops from the world’s best artists, plus galleries and interviews, community news and product reviews.



Ransomware Petya

March 29, 2016 18:15, by FGR* Blog

Ransomware é um código malicioso capaz de encriptar todo o disco rígido de um computador e pedir um valor de resgate. O mais novo que circula nas redes sociais, emails, etc, denomina-se Petya.

De acordo com a G Data, o Petya (.exe) é capaz de encriptar todo o disco rígido de um computador, deixando o sistema totalmente bloqueado. A “vítima” é atraída por uma falsa proposta de trabalho e realiza um download de um modelo de currículo. O PC, após o download, trava e durante o reinício do sistema a seguinte mensagem surgirá:

Na verdade, o que está realmente acontecendo é a encriptação dos dados do disco rígido.

Posteriormente, o usuário é convidado a pagar um regaste para recuperar a informação. A mensagem avisa ainda que os arquivos serão definitivamente eliminados caso o pagamento não seja realizado.

Solução? Mantenha seu antivírus atualizado (ou melhor, use Linux) e não acredite em tudo que vê nas redes sociais, email, etc.



GameTrailers.com: Review

March 29, 2016 17:04, by FGR* Blog

Please note that any reproduction of this video without the express written consent of GameTrailers is expressly forbidden.


Source link


Arcade Jr.

March 29, 2016 14:29, by FGR* Blog

Arcade Jr. é a excelente ideia de um brasileiro e um argentino que, em meio às revoluções da realidade virtual, investem na modernização do que uma vez deu certo: os arcades. Além de alguns botões coloridos e um joystick presos à uma caixa, ele é a modernização dos fliperamas das décadas de 80 e 90. Basta conectá-lo à TV, viajar no tempo e jogar.

Arcade Jr. – lrarcades.com



Dark Web’s Got a Bad Rep: 7 in 10 People Want It Shut Down, Study Shows

March 29, 2016 13:26, by FGR* Blog

Speculation—no matter how baseless—that online black markets for weapons helped make the terrorist attacks in Paris and Brussels possible hasn’t helped the reputation of the dark web’s anonymous corner of the internet. But one new study shows that even before that dubious link between online anonymity and terror attacks, global opinion on the dark web was already overwhelmingly negative.

On Tuesday, the Canadian think tank the Center for International Governance Innovation released the results of a survey of more than 24,000 individuals in 24 countries, asking their opinion of the dark web—the collection of anonymous web sites that can only be accessed via tools like the anonymity software Tor. In total, 71 percent of the respondents—and 72 percent of Americans in particular—said they believed the “dark net” should be shut down. “The basic perception is that it’s not a good thing,” says Eric Jardine, a CIGI fellow who specializes in research on the dark web and Tor. “For your average Joe or Jane, the dark web is not perceived as a very useful technology, and in fact it’s seen as harmful.”

Rather than depend entirely on survey respondents’ prior knowledge of what the dark web or darknet might be, CIGI’s researchers offered a three-sentence description of it as an anonymous part of the web accessible through only “special web browsers,” mentioning that “journalists, human rights activists, dissidents and whistleblowers can use these services to rally against repression, exercise their fundamental rights to free expression and shed light upon corruption,” while “hackers, illegal marketplaces (eg. selling weapons and narcotics), and child abuse sites can also use these services to hide from law enforcement.” With that prompting in mind, a majority of respondents in all of the two dozen countries surveyed said that the darknet should be shut down. In the most negative countries, like Mexico, India and Indonesia, at least four out of five respondents were opposed to the dark web’s existence, while in even the most darknet-friendly countries, such as Sweden and Hong Kong, 61 percent of respondents came out against it.

CIGI’s Jardine argues that recent media coverage, focusing on law enforcement takedowns of child porn sites and bitcoin drug markets like the Silk Road, haven’t improved public perception of the dark web. But he also points out that an immediate aversion to crimes like child abuse overrides mentions of how the dark web’s anonymity also has human rights applications. “There’s a knee-jerk reaction. You hear things about crime and its being used for that purpose, and you say, ‘let’s get rid of it,’” Jardine says.

Responding to CIGI’s survey, Tor Project spokesperson Kate Krauss defended Tor’s value for privacy and free speech in a statement to WIRED. “Tor is part of the infrastructure of the Internet and provides people in horribly repressive countries with the ability to read and write freely. Tor ensures human rights,” Krauss wrote. “If you poll people about whether or not they support the right to free expression—some will say no. That doesn’t mean that free expression isn’t precious. Tor allows free expression.”

In fact, Jardine points out that countries with a stronger tradition of protest do show more support for the dark web. In Hong Kong, for instance, only 62 percent respondents believed the dark web should be shut down, while in mainland China, those numbers reached 79 percent. And opinion of the dark web was lowest in countries with recent histories of terrorist- or drug-related violence, like Indonesia, India, and Mexico.

Belgium wasn’t included in the CIGI survey, which was carried out before the recent Brussels and Paris attacks. But 76 percent of French respondents said they wanted to see the dark web shut down. And those numbers are likely higher after last week, when the French Interior Minister Bernard Cazeneuve mentioned the darknet in remarks following the deadly bombing of the Brussels airport. Cazeneuve argued last Wednesday that “criminal uses…can be made of ​​darknet types of informal networks, or, in general, the part of the Internet that is not indexed by traditional search engines and which circulates a large mass of information issued by criminal organizations, including jihadists.” The Germany newspaper Bild in November also reported that ISIS’ Paris attackers used weapons purchased from a dark web black market. But that account was later discredited as a misreading of a German customs agency analysis, according to other German media.

Although the dark web does have troubling applications, the anonymous whistleblowing tools and privacy protections it offers have been adopted by organizations as mainstream as the New Yorker, the Guardian, and Facebook. Somewhat paradoxically, CIGI’s survey found that among the same respondents who tended to oppose the dark web’s existence, only 38 percent trusted that they weren’t being monitored online, and only 46 percent believed that information they accessed wasn’t being censored—two of the exact problems the dark web’s tools are meant to counteract. “It’s a weird scenario: people don’t trust that governments aren’t looking into their activities online, and yet the technologies that allow you to get around these concerns…they’re advocating to get shut down,” Jardine says. “There’s a contradiction here.”

Go Back to Top. Skip To: Start of Article.


Source link

PlayStation VR Pre-Orders Sales Continue To Stay Strong Sell Out In 60 Minutes

March 29, 2016 13:03, by FGR* Blog



I don’t know why everyone is rushing and getting stressed out over missing Amazon Preorders. Amazon will have a very limited amount of PSVR’s because they don’t have retail stores. You can STILL preorder from BB, Gamestop, Walmart, Target. Places that will have demos and store space available. I’m almost certain that since production got moved until October, and they will want tons of the shelves for christmas, there will be pretty close to PLENTY for everyone that wants one at launch.


Source link