Pixel Dungeon
This community is a place to talk strategies, tell stories, or discuss anything related to Pixel Dungeon or its many versions.
Rules:
-
1. No hate or adult themes of any kind: NSFW or illegal material, hate speech, personal attacks, harassment, doxxing, bullying, etc. are all strictly forbidden. Crude or offensive language should be kept to a minimum or avoided entirely.
-
2. Posts must directly relate to Pixel Dungeon: All content posted must directly reference Pixel Dungeon or one of its variants in some form. Loose connections or similar nomenclature from irrelevant works do not count.
-
3. Do not use other's work without giving credit: You may post things that were created by other people, but you must link to the original and credit the author. AI generated content is prohibited, as crediting the original authors is impossible.
-
4. Follow site-wide rules: https://legal.lemmy.world/fair-use/
We have a few title tags for standout posts:
- [MOD] - Posts by moderators about the community
- [DEV] - Announcements from a developer of a PD version
- [OC] - Self-made original content
Sister Communities:
view the rest of the comments
It's been forever since I messed with this sort of thing, but could you use something like Wireshark to see what programs are sending network traffic? I see that you've already gotten a reply about pixel dungeon specifically, but if this is an ongoing concern for you it might be useful to know how to check yourself for an arbitrary program. Iirc you can just run it and it will show all packets being sent/received by your machine and which programs are sending them. I haven't used Wireshark in over a decade, but a quick google seems to show it still exists, and if it's like I remember then it shouldn't be hard to learn how to use it.
Yoo I was looking for something similar! Not for SPD, but in general. Thanks for suggesting it!
Thank you. I will look into it at some point. I just usually assume that if a program really wants to spy on me, it will be programmed to turn off the spying if it detects that something like wireshark is on. But I guess that would not apply to our case here.
Consider a network tap. Should by design be invisible to the program being examined.