I think they got a little off topic and what can be done right now. Maybe BHG can't fix all the bugs but it can ban players who use it. I don't see the point in asking for a "brave" person to come and explain to us how these "cheat" "bugs" happen if we can report the cheaters to the CS team. I would ask that the repetitions be more precise and then we can "help them to help us"
Hi, Sergio.
Some cheats are not easy to identify because they don't leave traces for players. Requesting an accurate and reliable replay is necessary, but in some cases, that’s not the tool that will help identify certain types of cheats and cheaters.
In my complete and absolute ignorance about what is technically possible, I can only say that the ideal approach would be for technical support to investigate a reported player by checking the following:
- How many Tupolevs and Recons did the reported player have in stock before a battle?
- How many were used in the battle?
- How many are in stock after the battle?
If it’s possible to carry out these steps in a data investigation, then the support team will know whether the reported player used an exploit or cheat.
This seems to be the only way to definitively confirm whether a player has cheated because it only takes one troop for a cheater to duplicate it, one by one, until they have the desired number for each attack.
When does this type of cheating become suspicious?
When certain players use the same troops indiscriminately, battle after battle, regardless of whether it's necessary to use them or not.
Let’s agree that certain troops are difficult to obtain through rewards, but they are available for purchase in the app. So, players who have these troops are unlikely to waste them without real necessity. Who would be foolish, in the most prosperous alliances, to use rare troops in lost wars, or on targets that other players have already gotten 5 stars on, or when nearly all members of the same alliance use the exact same troops, war after war, battle after battle?
So, there are subtle ways to identify suspicious activities, and it’s up to us to report these activities to Customer Support. In theory, it’s then up to Customer Support to conduct a proper investigation and enforce their rules on abusers when a report of suspicious activity is confirmed.