Players of mobile AR combat game Reality Clash can now trade weapons with each other and earn RCC (Reality Clash Gold coins), which can be exchanged for fiat currency
Move sees Reality Gaming Group enter the billion dollar ‘crypto collectibles’ market
FOR IMMEDIATE RELEASE: Reality Gaming Group has launched a trading platform (https://realityclash.store) that enables players of mobile AR combat game Reality Clash to buy and sell limited-edition weapons and earn RCC (Reality Clash Gold coins), which can be cashed in for fiat currency on crypto exchanges.
All tradeable weapons are ERC 721 tokenised on the Blockchain with a proof of purchase (smart contract), a technology that is ushering in a new ‘crypto collectibles’ era for virtual items and downloadable content (DLC) in video games.
Crypto collectibles, pioneered by the likes of CryptoKitties, are a fundamentally new type of digital good. Unlike traditional in-game DLC, which is ultimately owned and controlled by a game’s publisher, blockchain-enabled crypto collectibles can be traded directly between players, independent of the game itself.
The forces of supply and demand create inherent value in crypto collectibles – as the value of a limited-edition Reality Clash (www.realityclash.com) weapon increases, players are free to decide whether to cash in on their investment and keep any profit, use the item within a game or take it to their grave.
Importantly, demand for Reality Clash weapons has already been established, with players having bought more than 5,500 items, spending over 1 million RCC coins on weapons since the game’s Armoury Store went live last year.
In addition, Reality Gaming Group’s trading platform and crypto collectibles can work with other compatible blockchain-enabled games – in the future players will be able to port their items across or even loan and gift them to a friend, all of which presents significant new opportunities for in-game economies.
New Reality Clash guns will be launching every month, plus users can create their own weapons – once user-generated weapons are approved by Reality Clash players can sell them in the marketplace and earn themselves money.
It is estimated that digital collectable card games (not blockchain-enabled) alone generated revenues of $1.5 billion in 2018, according to SuperData1.
However, the so-called ‘blockchain premium’ attached to crypto collectibles has seen that addressable market estimated at $950 billion2.
Reality Clash is an innovative AR first person combat game for mobile devices set in an underground world of cryptocurrency and hackers. Players are able to connect to friends in real-time using geo map technology, join private teams and enter competitive tournaments.
Reality Clash has been highlighted by Blockchaingamer.biz as one of the 10 most anticipated blockchain games of 2019 and has recently launched in the UK, Europe and Asia on Apple and Google app stores.
“Crypto collectibles are going to change the face of in-game economies, so we’re thrilled to open the Reality Clash trading platform and Marketplace for business,” said Reality Gaming Group Co-Founder Morten Rongaard. “Blockchain technology puts players in full control of their hard-earned digital assets, allowing them to decide when and where to use or trade them. It also opens up a wealth of new revenue opportunities for developers and publishers, enabling them to create immersive game experiences with a fully transparent digital asset marketplace.”
For more information, visit www.realityclash.store
Notes To Editors
About Reality Gaming Group
The Reality Gaming Group is the developer and publisher of mobile AR combat game Reality Clash, which is released in early 2019 and utilises exciting blockchain technology. It is also the creator of a ground-breaking AR geo-location platform for mobile, which can be deployed across a huge range of content types. The Reality Gaming Group development team has more than 20 years’ experience across Mobile, PC, Console, AR and VR games platforms. For more information, visit: http://realitygaminggroup.com
Stuart O’Brien – Mimram Media
Tony Pearce – Reality Gaming Group
Saints Row: The Third was an unexpected gem in 2011, a comparably progressive and slapstick riff on the Grand Theft Auto formula. Last week, Koch Media released a port for the Nintendo Switch. The result is a disappointment, but that’s not entirely the port’s fault.
The folks at Digital Foundry have done a fantastic job comparing this version to its nearly eight-year-old siblings. The results are a mixed-bag. The team found that the Switch port approaches parity with the original PS3 and Xbox versions of the game, particularly in 720p resolution in handheld mode. It doesn’t fare nearly as well in docked mode, as the 1080p resolution decreases the game’s already poor frame rate.
But worse than the frame rate is the game’s high amount of input lag. I’ve played the final build of the game, and the controls are unbearable. They’re slow, imprecise, and maddening when lining up a headshot — especially on the small handheld screen. Hopefully the controls will be improved by future updates — one is scheduled for later this week.
Digital Foundry doesn’t dig too deep into the game itself, even though the content itself can be just as frustrating as the controls and performance.
In hindsight, Saints Row The Third marks a transition from the crass and provocative early entries of the series to the more open-minded and inclusive later entry and expansions. But played today, it struggles to carry so much baggage from its era.
The first menu invites players to try “Whored Mode.” The “Sex Appeal” slider on the create-a-character menu inflates the female character’s breasts and the male character’s penis. There’s a dildo bat.
None of these details are particularly offensive as much as they’re dull and unfunny. Replaying this game feels like taking a time machine to a Spencer’s Gifts.
The port is not strong enough to recommend to potential newcomers who only own a Switch. And the original entry has been outdone in practically every way by Saints Row IV, making that entry a better starting point for folks with other consoles or a PC..
Apple, Microsoft, and Google are all releasing fixes for ZombieLoad, a scary security flaw in Intel chips that researchers just discovered – Business Insider
- Researchers that found the last huge Intel security hole have found a new one.
- This time, however, Intel and the rest of the industry were ready with patches.
- The hole impacts just about every PC and server that uses any kind of Intel processor.
- It lets hackers potentially see your web history, your passwords and the your disk encryption keys.
- Visit Business Insider’s homepage for more stories.
The same researchers that found the Intel Spectre and Meltdown flaws which sent Intel and the whole tech industry reeling has found another problem with Intel chips. And they say this vulnerability, named ZombieLoad, impacts PCs and servers of all flavors if they run Intel chips.
The good news is that the researchers have already reported it to Intel and other vendors, and security patches are being issued now.
Intel has already patched several of its current processors, and it released microcode that will patch others, it tells Business Insider. Among the Intel chips that are vulnerable are the Xeon, Broadwell, Sandy Bridge, Skylake, Haswell chips, Kaby Lake, Coffee Lake, Whiskey Lake, Cascade Lake, Atom and Knights processors, the company reported.
Intel has given this vulnerability a security rating of “medium.” PC makers Apple and Microsoft have also issued patches. As have browser makers Google and Mozilla.
While all of this sounds like a yawn — just another hole that vendors are patching — it is creating hubbub because it is another example of an entirely new type of security hole that impacts modern processors. It follows the discovery of the so-called Meltdown, Spectre, and Foreshadow holes in processors, which came to light last year.
And there are a lot of vulnerable Intel processors out there in the world that need to be patched. However, chips that have already been patched from the Spectre hole are less vulnerable to ZombieLoad, Intel says.
ZombieLoad is eye-popping because it allows hackers to see things like browser history, website content, user keys, and passwords, or system-level secrets, such as disk encryption keys. In other words, it may give hackers the literal keys to the secrets locked away through encryption on your computer. And it can be used on PCs and servers, even those in the cloud, although the big cloud vendors like Microsoft and Google have been given warnings to patch before the researcher went public with this hole.
An Intel spokesperson explains that the company is already well aware of this new security hole, which has the technical name of Microarchitectural Data Sampling (MDS):
“Microarchitectural Data Sampling (MDS) is already addressed at the hardware level in many of our recent 8th and 9th Generation Intel Core processors, as well as the 2nd Generation Intel Xeon Scalable Processor Family. For other affected products, mitigation is available through microcode updates, coupled with corresponding updates to operating system and hypervisor software that are available starting today.
We’ve provided more information on our website and continue to encourage everyone to keep their systems up to date, as its one of the best ways to stay protected. We’d like to extend our thanks to the researchers who worked with us and our industry partners for their contributions to the coordinated disclosure of these issues.”
Zombieload was discovered and reported by security researchers Michael Schwarz, Moritz Lipp, Daniel Gruss (of the Graz University of Technology) and Jo Van Bulck (of the computer science research group at KU Leuven university.)
These guys are becoming so famous in the security worlds that with this new hole, they’ve become a Twitter internet meme.
Get the latest Intel stock price here.
Microsoft today is taking the unusual step of releasing security updates for unsupported but still widely-used Windows operating systems like XP and Windows 2003, citing the discovery of a “wormable” flaw that the company says could be used to fuel a fast-moving malware threat like the WannaCry ransomware attacks of 2017.
The vulnerability (CVE-2019-0708) resides in the “remote desktop services” component built into supported versions of Windows, including Windows 7, Windows Server 2008 R2, and Windows Server 2008. It also is present in computers powered by Windows XP and Windows 2003, operating systems for which Microsoft long ago stopped shipping security updates.
Microsoft said the company has not yet observed any evidence of attacks against the dangerous security flaw, but that it is trying to head off a serious and imminent threat.
“While we have observed no exploitation of this vulnerability, it is highly likely that malicious actors will write an exploit for this vulnerability and incorporate it into their malware,” wrote Simon Pope, director of incident response for the Microsoft Security Response Center.
“This vulnerability is pre-authentication and requires no user interaction,” Pope said. “In other words, the vulnerability is ‘wormable,’ meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017. It is important that affected systems are patched as quickly as possible to prevent such a scenario from happening.”
The WannaCry ransomware threat spread quickly across the world in May 2017 using a vulnerability that was particularly prevalent among systems running Windows XP and older versions of Windows. Microsoft had already released a patch for the flaw, but many older and vulnerable OSes were never updated. Europol estimated at the time that WannaCry spread to some 200,000 computers across 150 countries.
CVE-2019-0708 does not affect Microsoft’s latest operating systems — Windows 10, Windows 8.1, Windows 8, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, or Windows Server 2012.
More information on how to download and deploy the update for CVE-2019-0708 is here.
All told, Microsoft today released 16 updates targeting at least 79 security holes in Windows and related software — nearly a quarter of them earning Microsoft’s most dire “critical” rating. Critical bugs are those that can be exploited by malware or ne’er-do-wells to break into vulnerable systems remotely, without any help from users.
One of those critical updates fixes a zero-day vulnerability — (CVE-2019-0863) in the Windows Error Reporting Service — that’s already been seen in targeted attacks, according to Chris Goettl, director of product management for security vendor Ivanti.
Other Microsoft products receiving patches today including Office and Office365, Sharepoint, .NET Framework and SQL server. Once again — for the fourth time this year — Microsoft is patching yet another critical flaw in the Windows component responsible for assigning Internet addresses to host computers (a.k.a. “Windows DHCP client”).
“Any unauthenticated attacker who can send packets to a DHCP server can exploit this vulnerability,” to deliver a malicious payload, notes Jimmy Graham at Qualys.
Staying up-to-date on Windows patches is good. Updating only after you’ve backed up your important data and files is even better. A good backup means you’re not pulling your hair out if the odd buggy patch causes problems booting the system. So do yourself a favor and backup your files before installing any patches.
Note that Windows 10 likes to install patches all in one go and reboot your computer on its own schedule. Microsoft doesn’t make it easy for Windows 10 users to change this setting, but it is possible. For all other Windows OS users, if you’d rather be alerted to new updates when they’re available so you can choose when to install them, there’s a setting for that in Windows Update.
As per usual, Adobe has released security fixes for Flash Player and Acrobat/Reader. The Flash Player update fixes a single, critical bug in the program. Adobe’s Acrobat/Reader update plugs at least 84 security holes.
Microsoft Update should install the Flash fix by default, along with the rest of this month’s patch bundle. Fortunately, the most popular Web browser by a long shot — Google Chrome — auto-updates Flash but also is now making users explicitly enable Flash every time they want to use it. By the summer of 2019 Google will make Chrome users go into their settings to enable it every time they want to run it.
Firefox also forces users with the Flash add-on installed to click in order to play Flash content; instructions for disabling or removing Flash from Firefox are here. Adobe will stop supporting Flash at the end of 2020.
As always, if you experience any problems installing any of these patches this month, please feel free to leave a comment about it below; there’s a good chance other readers have experienced the same and may even chime in here with some helpful tips.
You can skip to the end and leave a comment. Pinging is currently not allowed.
Sekiro: Shadows Die Twice is one of the best games of 2019, and it has been made even better by a surprisingly busy, and silly, mod community.
Mods have helped players tweak the difficulty, improve the graphics, and play as Shrek. But I am particularly fond of one of the newest mods, which merges maybe the best game of this year with arguably the best game of any year.
Yes friends, it is time to talk about Nier: Automata! One of our favorite games of 2017 and favorite concerts of 2018 now makes a play for favorite mod of 2019.
The new Sekiro mod adds co-protagonist YoRHa No. 2 Type B, or 2B for short. While she isn’t accompanied by companion 9S or a bullet-spewing drone, this version of 2B is still an expert in sword combat. She wields the familiar katanas. A note to potential modders: the mod is entirely visual, so you’ll still get dear Sekiro’s voice echoing from this murderous robot.
The mod is by Forsakensilver, and can be downloaded on NexusMods.