Explore This 3D World Rendered In ASCII Art:
Pixelated RPGs are pretty standard in games like Legend of Zelda and Pokemon, but have you ever seen anything like ASCIICKER? It’s a full-color three-dimensional world rendered with ASCII art and playable in your browser. [Ed's Comment: It works with Brave and Firefox, but not with Pale Moon in our very limited testing.]
For the time being, the game exists as an experiment. There’s no storyline or goals other than exploring the world, although you can meet up with (or follow) others exploring the game — although all of the sprites look the same, so it may be difficult to have interactions. The game was created by [Gumix] and built entirely in JavaScript without using any other game engines.
(Score: 5, Insightful) by Anonymous Coward on Friday January 03 2020, @06:50AM (5 children)
This webpage uses not just proprietary javascript, but proprietary binary code in a format called WebAssembly [wikipedia.org].
So basically, now they want you to download and run proprietary binary software on your computer, just to view a web page. The browser is expected to run this software automatically, without prompting the user. Great! Nothing bad ever happened from downloading and automatically running proprietary binary code from unknown websites.
A June 2019 study showed that the most popular uses of WebAssembly are:
*Cryptocurrency mininng
*Bypassing javascript mitigations for Meltdown and Spectre
*General malicious code, which is easier to hide from malware scanners than javascript, because it is in binary and more easily obfuscated
I see nothing wrong with this at all.
(Score: 0) by Anonymous Coward on Friday January 03 2020, @07:02AM (2 children)
Can you cite that study please?
(Score: 3, Informative) by coolgopher on Friday January 03 2020, @07:16AM (1 child)
I believe it's the one cited on the provided wikipedia link.
(Score: 0) by Anonymous Coward on Friday January 03 2020, @10:06AM
There's 70 citations there. Five (!) of them point to the study that https://www.infoq.com/news/2019/10/WebAssembly-wasm-malicious-usage/ [infoq.com] summarizes, which seems to be the one GP related.
(Score: 0) by Anonymous Coward on Friday January 03 2020, @08:30AM
Because there is nothing wrong, paisano. Capisce?
(Score: 2) by NickM on Friday January 03 2020, @02:06PM
Webassembly or obfuscated (not just minimized) js, both need external tool to be properly analyzed, both are a plague!
To reverse wasm I use https://github.com/WebAssembly/wabt [github.com] on wasm files to produce c code and on obfuscated js I use http://relentless-coding.org/projects/jsdetox/ [relentless-coding.org] to produce comprehensible js, in both cases the resulting files must be manually annotated before they are truly readable.
I a master of typographic, grammatical and miscellaneous errors !