Article suggestions: Difference between revisions

Emayeah (talk | contribs)
m fixed minor spelling mistakes
 
(5 intermediate revisions by 5 users not shown)
Line 127: Line 127:
|-
|-
|[https://www.skystone.games/ Skystone Games]
|[https://www.skystone.games/ Skystone Games]
|Boundary, a multiplayer online-only first-person shooter, got shut down just a year after it's release by Skystone games, and it's publishing rights relinquished, citing "ongoing delays and a lack of updates from the developer". Studio Surgical Scalpels (the developer) stated that the publisher decissions were "extremely sudden and unreasonable", and attempted to "regain the rights to boundary". The game has been offline for more than a year at the time of writing, and no refunds or communications to the userbase has been made by Skystone Games.
|Boundary, a multiplayer online-only first-person shooter, got shut down just a year after its release by Skystone games, and its publishing rights relinquished, citing "ongoing delays and a lack of updates from the developer". Studio Surgical Scalpels (the developer) stated that the publisher decissions were "extremely sudden and unreasonable", and attempted to "regain the rights to boundary". The game has been offline for more than a year at the time of writing, and no refunds or communications to the userbase has been made by Skystone Games.
|<ref>{{Cite web |date=2024-06-19 |title=Boundary - End of service notice |url=https://store.steampowered.com/news/app/1364020/view/4209257868262605607?l=english |url-status=live |access-date=2025-07-07 |website=Steam}}</ref><ref>{{Cite web |date=2024-06-30 |title=Boundary Shut Down: Who's to Blame? |url=https://www.youtube.com/watch?v=Kr8IhV1fovE |url-status=live}}</ref>
|<ref>{{Cite web |date=2024-06-19 |title=Boundary - End of service notice |url=https://store.steampowered.com/news/app/1364020/view/4209257868262605607?l=english |url-status=live |access-date=2025-07-07 |website=Steam}}</ref><ref>{{Cite web |date=2024-06-30 |title=Boundary Shut Down: Who's to Blame? |url=https://www.youtube.com/watch?v=Kr8IhV1fovE |url-status=live}}</ref>
|-
|-
Line 138: Line 138:
|<ref>{{Cite news |last=Khullar |first=Kunal |date=Jul 3, 2025 |title=Nintendo is restricting the Switch 2's USB-C port — most third-party docks and accessories won't work thanks to proprietary protocols |url=https://www.tomshardware.com/video-games/nintendo/nintendo-is-restricting-the-switch-2s-usb-c-port-most-third-party-docks-and-accessories-wont-work-thanks-to-proprietary-protocols |access-date=Jul 9, 2025 |work=Tom's Hardware}}</ref><ref>{{Cite news |last=Corsetti |first=Adam |date=Jul 3, 2025 |title=USB-C port testing explains why a third-party Nintendo Switch 2 dock won't work with console |url=https://www.notebookcheck.net/USB-C-port-testing-explains-why-a-third-party-Nintendo-Switch-2-dock-won-t-work-with-console.1049869.0.html |access-date=Jul 9, 2025 |work=Notebook Check}}</ref><ref>{{Cite news |last=Hollister |first=Sean |date=Jul 3, 2025 |title=How Nintendo locked down the Switch 2’s USB-C port and broke third-party docking |url=https://www.theverge.com/report/695915/switch-2-usb-c-third-party-docks-dont-work-authentication-encryption |url-status=live |archive-url=https://web.archive.org/web/20250708174112/https://www.theverge.com/report/695915/switch-2-usb-c-third-party-docks-dont-work-authentication-encryption |archive-date=Jul 8, 2025 |access-date=Jul 9, 2025 |work=The Verge}}</ref>
|<ref>{{Cite news |last=Khullar |first=Kunal |date=Jul 3, 2025 |title=Nintendo is restricting the Switch 2's USB-C port — most third-party docks and accessories won't work thanks to proprietary protocols |url=https://www.tomshardware.com/video-games/nintendo/nintendo-is-restricting-the-switch-2s-usb-c-port-most-third-party-docks-and-accessories-wont-work-thanks-to-proprietary-protocols |access-date=Jul 9, 2025 |work=Tom's Hardware}}</ref><ref>{{Cite news |last=Corsetti |first=Adam |date=Jul 3, 2025 |title=USB-C port testing explains why a third-party Nintendo Switch 2 dock won't work with console |url=https://www.notebookcheck.net/USB-C-port-testing-explains-why-a-third-party-Nintendo-Switch-2-dock-won-t-work-with-console.1049869.0.html |access-date=Jul 9, 2025 |work=Notebook Check}}</ref><ref>{{Cite news |last=Hollister |first=Sean |date=Jul 3, 2025 |title=How Nintendo locked down the Switch 2’s USB-C port and broke third-party docking |url=https://www.theverge.com/report/695915/switch-2-usb-c-third-party-docks-dont-work-authentication-encryption |url-status=live |archive-url=https://web.archive.org/web/20250708174112/https://www.theverge.com/report/695915/switch-2-usb-c-third-party-docks-dont-work-authentication-encryption |archive-date=Jul 8, 2025 |access-date=Jul 9, 2025 |work=The Verge}}</ref>
|-
|-
|Not applicable/[[Device bricking]]
|There have been repeated incidents of various companies [[Device bricking|bricking devices]] owned by consumers. This requires a theme article to be finally made. May be ideal to have a sibling article titled [[Software bricking]].
|
|-
|Not applicable
|Factory reset and deconfiguration guides for removing personal/sensitive data from devices before change of ownership to avoid that data being used for identity theft, spear phishing and scams.
|<ref>{{cite web|title=ACCC Report Revelations Of Scams And Cyber Crime Not Surprising |website=Tech Business News |url=https://www.techbusinessnews.com.au/news/accc-report-revelations-of-scams-and-cyber-crime-not-surprising/ |publication-date=29 April 2024 |access-date=20 July 2025 |quote="Whilst there exists the Protective Security Policy Framework (PSPF) and the Information Security Manual (ISM) which direct government and critical industry to use NAID AAA certified recyclers to destroy and sanitise data at end of life, there remains confusion over ownership of accountability."}}</ref>
|-
|Not applicable
|Users are being forced by law to violate their privacy to access adult websites, when numerous sites that won't follow the law exist and are unsafe.
|<ref>{{Cite web |last=Ortutay |first=Barbara |date=27 Jun 2025 |title=What to know about online age verification laws {{!}} AP News |url=https://apnews.com/article/internet-age-verification-supreme-court-def346d7bf299566a3687d8c4f224fec |url-status=live |access-date=19 Jul 2025}}</ref><ref>{{Cite web |date=28 Jun 2025 |title=The Scam of Age Verification {{!}} PORNBIZ.COM |url=https://pornbiz.com/post/17/the_scam_of_age_verification/en#5 |url-status=live |access-date=19 Jul 2025}}</ref>
|-
|[[Microsoft]]
|Microsoft uses software engineers based in China to work on US Defense Department systems with laughably ineffective precautions. I think this is relevant in the context of Microsoft's attitude towards cloud security. In the past, master keys have been stolen by Chinese hackers and from my understanding, it's not even clear to what extent those groups still have access to Microsoft's internal systems, and by extension, Microsoft customers'. This needs more research though.
|<ref>{{Cite web |last=Dudley |first=Renee |date=2025-07-15 |title=A Little-Known Microsoft Program Could Expose the Defense Department to Chinese Hackers |url=https://www.propublica.org/article/microsoft-digital-escorts-pentagon-defense-department-china-hackers |website=ProRepublica}}</ref>
|-
|Not applicable
|[[Malicious Compliance]]
Companies like Apple comply with regulations such as those imposed by the EU by trying to follow the wording, but not the spirit of the legislation. For instance, there were early reports that Apple would support USB-C, but only with Apple certified devices and cables, allowing them to continue the lucrative "Made for iPhone" certification programme. They only backtracked when the EU indicated this would not be considered compliant with the USB-C mandate.
|<ref>{{Cite web |title=Malicious Compliance |url=https://en.wikipedia.org/wiki/Malicious_compliance |website=Wikipedia}}</ref>
|}
|}