Re: On base finding methods
Posted: Tue Feb 09, 2021 11:34 am
I suppose I just can't imagine someone coming up with a technique other than the 3 you listed which isn't incredibly overpowered like the wolf exploit. Are there any historical examples? Because I assume any new exploit would be similarly unfair and just shouldn't be allowed.Yukar9 wrote: ↑Tue Feb 09, 2021 5:23 am I'm not necessarily against that.
The idea behind keeping legit "exploits" secret is the same as the reason not to say how a base was found if it was found legit, that essentially admins shouldn't intervene if there wasn't cheating.
Making a public list would mean that someone couldn't use a new technique not on the list without having their method revealed, essentially admin intervention in the case where no rules were broken. While it would also prevent this scenario.