The big issue is that the console companies are generally more active in targeting people on more active consoles, and are incredibly strict if you’re caught cheating. Just being connected to psn on a hacked ps3 runs you a very real risk of getting an account ban. I can only imagine they’re far more active in banning ps4/ps5 users who are running hacked firmware. And Idk if there’s been any major hacks on the Xbox side of things.
As a side note, if you want to see a cluster fuck of every hack and cheat imaginable, hit up the original splatoon servers on Wii u. It’s honestly completely insane how much people have broken it
From my experience, it largely depends on how online multi-player is handled. Things that require game-specific accounts or have drm tied to an account like steam, it won’t work. But a lot of stuff on console works fine since it’s presumed that the anti-piracy has already happened. I play plenty of pirated games online on 3ds, Wii u, and psvita
Theoretically (assuming it’s an android) you could use an old phone. I know both mullvad and Proton have vpn clients for Android, and libretorrent works well. And you could plug in an external USB drive for more storage. And then use something like a Chromecast to send things to your tv
Fair point, but unless you’re just interested in seeing something do poorly, leaks can absolutely fuck over somethings chances of success, often with no particular benefit.
If it works on your end, no reason to stop using it. The reason they suggested to move elsewhere is because, at the time, there was no indication that j2k had any plans for continued development. Might’ve changed since they put that out, but that’s what they sajd
They didn’t even fucking try the bare minimum of just refusing to comply. Besides, it’s such a comically baseless case by some fucking worthless gook company. It doesn’t cost tens of thousands of dollars to tell them to shove it up their ass, at the bare minimum.
I mean the eff can only do so much to defend people who didn’t even fucking bother in the slightest to defend themselves and just rolled over at every turn
For the purposes of practicality, you’re probably safe so long as you don’t have to log in using credentials tied to you. They simply aren’t going to care enough, and will likely just put up some network restrictions if they get a letter from the isp.
But for the purposes of security, yes, you can absolutely be identified. For one, if your device Mac address isn’t spoofed, they can just see what device you used, and skim security footage for someone using it in the right time frame. Even without that, they can just see who was there for the amount of time you were connected, and find you that way. Especially if you do anything that would identify yourself while there (like use a library card).