Just to be technical, here… Those past games, BG1 and BG2, utilized a very different ruleset (the ADND ruleset, if I recall correctly) to the ruleset BG3 utilized (5e). While they share a lineage, ADND and 5e are quite different.
Just to be technical, here… Those past games, BG1 and BG2, utilized a very different ruleset (the ADND ruleset, if I recall correctly) to the ruleset BG3 utilized (5e). While they share a lineage, ADND and 5e are quite different.
Actually, no… it’s telling you that it thinks it’s not a legal copy. The company doesn’t actually know. It’s not like they sit down and write out by hand every key that is created. Those keys are generated by some algorithm. The company can identify if an algorithm was compromised (either the generation method identified or a significant portion of keys from said algorithm being used without them having been generated by the company), or they surmise that a chunk of codes, that had been previously generated for distribution, were nabbed when a number of them start to get activated without the company seeing a corresponding increase in sales. They more than likely do not have an exact list of which codes were stolen, just an assumption.
Here’s an example for ya… Company gives Legit LTD a set of codes to sell. Unfortunately, the thieves seal hack into Legit LTD’s systems and are able to copy a chunk of those codes. Legit LTD does not realize the breach for a day, or a week, and sells those codes to customers. At the same time, the thieves setup a seeming legit web store and started selling their ill gotten codes on that site. Two different customers are looking for Company’s software. One buys a code from Legit LTD. The other buys from thieves seemingly legit store. Just so happens that both stores sold the same code. Now two people have a copy of the same code. Both customers, in this case, believed they were buying a legit code. Both believe their code is valid. Before either can activate those codes, however, Legit LTD realizes they’ve been hacked and tell Company. Company, not knowing exactly which codes were stolen, decides to invalidate the batch… but there are legit customers in the wild that have codes from that batch and there’s no way for Company to tell who bought from who. BOTH customers, at this point, go to activate their code and both are told they’re running a pirated code. Neither of them really pirated, however. The thief did, but the thief isn’t the run using the code.
As such, no… Company and Legit LTD would find it very difficult, if not impossible, to determine who bought legitimately. Most companies, when this happens, would say, fuck’em and let both customers suffer. This company chooses to tell them they’re running suspected pirated codes (though, they don’t know for sure), and, regardless, neither customer would be pirating because both believe they purchased legit codes all above board.
Welcome to software, my friend. :D
That’s the key, though… KNOWINGLY stolen! If you purchased an item but where unaware that it was stolen, there’s no legal issue and, unless there’s something that can link that item back to it’s original owner… I guess it’s yours then.
As far as the digital key is concerned, this is even more nebulous. Sure, their database or software thinks the key is stolen, but that’s just a binary bit somewhere which could, by accident or by a bug in the software, be in error. If, as a purchaser, you were unaware that the dealer from which you purchased said key was selling keys illegally, they is the same as buying a stolen TV from the flea market. Unless you knew, you did nothing wrong. As for the software telling you it’s stolen… again, that’s only what the software things. It could be wrong.
Additionally, purchasing suspect keys is even more legal as there’s no intrinsic value to the key itself. It’s just a string of numbers and symbols. Keep it, it’s yours. Have fun. Play hangman. The company who owns the software for which that key was intended… didn’t loose anything. They still have their software. If the key worked? Well, if the key worked, that means the company and/or software doesn’t think the key stolen or otherwise illegitimate (which, can also be an error on the companies part).
In this case, the company says, in essence, “We think this key is stolen, but we cannot prove you did the stealing. We’re not going to belabor the issue. Keep on, and let your conscience guide you”
Sounds like that may rankle your sense of right and wrong, but, them’s the fact. You have never seen someone arrested for purchasing a software key, nor have you seen anyone arrested for purchasing a physical product they believed to be legit even when it wasn’t.
I am not a lawyer, but… This does not prove you’re pirating the software. It’s informing the customer (who, as far as they may be aware, obtained the key in a totally legit manner) that the company thinks the key to be a pirated key (of which, it might not actually be, but, rather identified as such by the company or software in error). It is definitely designed to illicit some form of guilt if you did in-fact pirate the software (which is between you and your conscience), but it is not proof that you pirated it. That said, I totally back what this company is doing!
As if any of that is more complicated than running your off the shelf Windows computer… at about the same cost… because, ultimately, they’re the same thing… an operating system, running one or more storage drives, plugged into a network. If that is too complex to wrap one’s mind around… well… shrugs
If you have a computer, and it’s on the internet, you have NAS… Network Attached Storage… your computer is on the network, and it has storage, then it’s network attached storage. Everything else is just software controlling it all. FFS
If your phone is Android… then the phone’s operating system is “open source” ( for reference ). Also, the kernel of Android is Linux, which is, itself, an Open Source project.
Now, those are just the core systems that run an Android phone. Obviously not every app on the phone is Open Source. Most likely, not even the majority of apps are open source. That said, if you look into it, you’d probably be surprised to find far more Open Source apps on your phone than you think there are.
You’re absolutely right… it’s a game. Larian could do whatever they wish. Then again, what’s the point of utilizing an IP and Ruleset for your game if you’re not planning to adhere to that IP and Ruleset as closely as you can within the limitations of PC game? And if you do adhere (as much as you can) to the rules, then there are going to be some things that are possible in one ruleset that are not possible in another (and vice versa) while maintaining a fun player experience in a medium (PC gaming) that cannot adapt rules like a human can while still being accurate enough for those players that know the ruleset and those that have never used that ruleset before.