←back to thread

242 points discoinverno | 4 comments | | HN request time: 0.852s | source

Rebels in the sky is a P2P multiplayer game about crews of space pirates roaming the galaxy to play basketball against each other. It's basically a basketball managerial game with some pirate-y stuff. It's a P2P game with no central server, built on top of libp2p. Players interaction are limited to playing games against each other and trading pirates.

The game runs as a terminal application, meaning that you just need to run it from your terminal.

You can try the game over ssh without installing: `ssh frittura.org -p 3788`

My server is not very powerful and there is a limit to the number of concurrent players, so if you like it I would appreciate it if you could install it (https://github.com/ricott1/rebels-in-the-sky?tab=readme-ov-f...) and run it locally :)

Here is a trailer (not of the last version, so some little things are different): https://github.com/user-attachments/assets/aaa02f04-06db-4da...

Show context
emmelaich ◴[] No.42218629[source]
Reminder that ssh'ing to some random server is not without some privacy concern.
replies(1): >>42220210 #
1. discoinverno ◴[] No.42220210[source]
True, I can see your public key, username, and IP I guess. I only log the username and hash of the public key/password that I use for storing save files (the logs are for debugging, but I swear I don't sell them to google). You can see what I do in the source, of course you have to trust me on that :)
replies(1): >>42220480 #
2. emmelaich ◴[] No.42220480[source]
Yes, sorry should've said I never doubted you!

My comment more addressed to the clients, who can mitigate the issue with appropriate ssh_config.

replies(1): >>42221875 #
3. withinboredom ◴[] No.42221875[source]
More specifically, make sure that you aren't forwarding your ssh keys; otherwise the game can impersonate you on any server the keys work on.
replies(1): >>42225241 #
4. emmelaich ◴[] No.42225241{3}[source]
Ah, that's worse than a mere privacy issue! Good point.

I was thinking merely about anonymity.

Both can be largely eliminated by having per host or per organization Identities and using IdentitiesOnly.