The reason that they require an account is because if they did not require user side authentication then it would be trivial to upload obfuscated malware and then use Nexus as a host to distribute it. If someone uploads malware to a random S3 bucket or random VPS or random shared server and tries to use it as a malicious host, the owner and operator will notice a massive bandwidth spike Nexus won’t notice 30,000 downloads.
Cool hope they do a decent job moderating the servers they run and limiting malware exposure. I also hope they’ve taken steps to prevent themselves being used as a host for malicious entities to distribute malware to third parties
News flash running the servers isn’t free.
Yes they are tracking us. That’s how they pay to keep the servers running.
If your not paying you are the product.
Yes I know.
Since we’re necrosing the thread
The reason that they require an account is because if they did not require user side authentication then it would be trivial to upload obfuscated malware and then use Nexus as a host to distribute it. If someone uploads malware to a random S3 bucket or random VPS or random shared server and tries to use it as a malicious host, the owner and operator will notice a massive bandwidth spike Nexus won’t notice 30,000 downloads.
We’re talking about for downloading not uploading.
If you’re paying they’re also tracking you.
But somehow eg. rdr2mods.com is free, and without account. Oh wonder.
Ah, like the sites of the 90s.
Mods for one game vs basically every game
I could probably host the entirety of the mods on that site on my homelab, Nexus is exponentially larger and more complex
As it should be. Or are we pretending that centralization is suddenly good now?
It has always had its perks.
You mean cash for shareholders/owners? And a hassle to move to the next platform once it destroys itself?
Do you consider those perks? I certainly don’t.
Cool hope they do a decent job moderating the servers they run and limiting malware exposure. I also hope they’ve taken steps to prevent themselves being used as a host for malicious entities to distribute malware to third parties