We are a growing community of 44,940 jumpers from all around the world who share the same passion for rocket jumping in Team Fortress 2.
Join our Steam group today!
Server operators, please be advised. There is an exploit in the wild compromising SourceBans++ web installs affecting the last pre-PHP 8.1 version 1.6.4 and the new PHP 8.1 branch up until the version 1.7.0 released with the security patch yesterday.
The attacker is able to compromise the installation by spoofing a successful OpenID login with a different admin account. Depending on the account compromised, this privilege escalation may allow for rcon access via the rcon console, therefore you should assume your rcon password has been compromised. Users may also be added/edited/removed if the compromised account has web panel admin access. Existing user email addresses may also be viewed.
Please note PHP 8.1 must be installed on your web server to run the SourceBans version 1.7.0 that includes the security patch. This also requires updating Composer dependencies, one of which requires PHP to have the Sodium extension.
Update to the latest release here: https://github.com/sbpp/sourcebans-pp/releases/tag/1.7.0
Introducing Beam Hop! You can create your own force-field beams by hitting alt-fire after firing a rocket. A beam will appear between the rocket and where you aim.
You can briefly bunny hop on top of the beam or even rocket jump on one. Touching a beam shortens its lifespan but you can recharge it by firing an extra rocket on it up close. Can you chain a beam pogo?
Challenge yourself this weekend and creatively cheese through all the jump maps!
A recently discovered exploit on Google Pixel phones' default screenshot editor allows unprocessed images (e.g. images uploaded onto Discord from 5 years ago until January 17) that were edited (e.g. crop or marker) to be partially reversed to recover contents from the original image. This may have security implications for users who may have inadvertently shared sensitive information assuming the edits were sufficient.
For more information, see:
https://www.theverge.com/2023/3/19/23647120/google-pixel-acropalypse-exploit-cropped-screenshots
https://twitter.com/ItsSimonTime/status/1636857478263750656