Author Topic: can I use my ID on 2 different IPs  (Read 1128 times)

Just wondering because I'm staying at my grandparents house for a week.

Just wondering because I'm staying at my grandparents house for a week.

Wow, you actually bought blockland :o.

not at same time.

but i have 4 homes and 5 Internets ive used my 1 key on.

put your key on a paper, go there, download blockland ,put your key on your grandparents computer, play it, uninstall blockland then go back home

Well yeah, one at a time, just not at the same time.

put your key on a paper, go there, download blockland ,put your key on your grandparents computer, play it, uninstall blockland then go back home
Or just delete key.dat.

Well yeah, one at a time, just not at the same time.
Or just delete key.dat.
k thx

i dont think badspot even checks these things unless abuse, or support comes up and he has to.

but unless your IP hops from one location to the next every other day, no one would think your key-sharing.
your not expected to never use another computer at another location after you buy a game. that would be unreasonable.

He checks it if the log is flooded with name changes and ip changes over a 3 second time period going halfway across the world, or if you ask him to check it.

It's fine if you use it but if it starts hopping around everywhere it'll be a problem.

There will not be any issues as long as you are legitimately using it. It is very easy to tell the difference between someone sharing and someone using it in two locations so don't worry unless you're actually sharing with a friend.

I'm concerned if I have a dedicated at home and I'm connecting to my server from somewhere else - then what?

Still fine. People are only banned if there is absolutely concrete evidence that they're sharing - and even then it usually has to be reported before action is taken. There's no automated system or routine checking that's done to deactivate shared keys.

Still fine. People are only banned if there is absolutely concrete evidence that they're sharing - and even then it usually has to be reported before action is taken. There's no automated system or routine checking that's done to deactivate shared keys.
No, are server-client authentications kept seperate?


Yeah, they're separate.