I suppose I just can't imagine someone coming up with a technique other than the 3 you listed which isn't incredibly overpowered like the wolf exploit. Are there any historical examples? Because I assume any new exploit would be similarly unfair and just shouldn't be allowed.Yukar9 wrote: ↑Tue Feb 09, 2021 5:23 am I'm not necessarily against that.
The idea behind keeping legit "exploits" secret is the same as the reason not to say how a base was found if it was found legit, that essentially admins shouldn't intervene if there wasn't cheating.
Making a public list would mean that someone couldn't use a new technique not on the list without having their method revealed, essentially admin intervention in the case where no rules were broken. While it would also prevent this scenario.
On base finding methods
Re: On base finding methods
Re: On base finding methods
You're right, it's not been a common scenario. Does somebody want to make a wiki page for this?