Language Selection

English French German Italian Portuguese Spanish

Why A Popular Open-Source Game Isn't On Steam

Filed under
Gaming

While more and more closed-source games -- ranging from indie titles to AAA games -- are heading to Steam ahead of SteamOS and Steam Machines, there still isn't too many open-source games on Valve's digital distribution platform. Here's some information why one of the more popular cross-platform open-source first person shooters isn't yet to be found on Steam.

Posted today on the Xonotic blog is why the first person shooter isn't yet on Steam. Xonotic is a very popular open-source game and being forked from Nexuiz is one of the most visually impressive open-source games. Xonotic isn't your AAA title, but its DarkPlaces-enhanced engine and creative visuals and in-game assets are much better than what you normally see from open-source games. Xonotic is also one of my favorite open-source games to use for GPU/driver benchmarking due to its visual intensity.

Xonotic developers aren't in opposition to Steam, but there's some "problems" they must solve first:

rest here




More in Tux Machines

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux

Red Hat News