-
, , , , , , , , , ,
-
Spielt gerade: GT7 | 60fps FTW
Automatisierte Remote Rennen mittels eines Yahoo! Widgets:
http://www.gtplanet.net/forum/showthread.php?t=185890
HOW DOES IT WORK?
This Widget, to put it simply, emulates a web browser. Using HTTPS, it first authenticates with store.playstation.com to authenticate your credentials. Then, just like a browser, it stores the logged in session and starts making requests to the JSON APIs on gran-turismo.com. It requests your profile information and the status of your PS3, then tries to automatically launch a race if it's online and ready to go, trying to fill all 16 driver slots with random drivers from your friends list. Then, it monitors the status of the race using the Remote Race JSON API, updating the display appropriately, and when the race is over, it repeats. Simple as that.
This Widget, to put it simply, emulates a web browser. Using HTTPS, it first authenticates with store.playstation.com to authenticate your credentials. Then, just like a browser, it stores the logged in session and starts making requests to the JSON APIs on gran-turismo.com. It requests your profile information and the status of your PS3, then tries to automatically launch a race if it's online and ready to go, trying to fill all 16 driver slots with random drivers from your friends list. Then, it monitors the status of the race using the Remote Race JSON API, updating the display appropriately, and when the race is over, it repeats. Simple as that.
I DON'T TRUST YOU WITH MY PSN ACCOUNT.
I understand why you wouldn't. You can crack open the Widget and look at all the source files with this Widget. It is trivial for me to obfuscate the JavaScript, but I have not because I have nothing to hide.
I'm also fully compliant with Yahoo! Widgets' security policies; you can see every domain my Widget accesses right in the security prompt. Any domain outside of that whitelist is blocked by the engine, so you can see that your login credentials are not going through any servers they shouldn't be.
I understand why you wouldn't. You can crack open the Widget and look at all the source files with this Widget. It is trivial for me to obfuscate the JavaScript, but I have not because I have nothing to hide.
I'm also fully compliant with Yahoo! Widgets' security policies; you can see every domain my Widget accesses right in the security prompt. Any domain outside of that whitelist is blocked by the engine, so you can see that your login credentials are not going through any servers they shouldn't be.