Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Native protection settings for interactions with restrict or remove own-avatar agency, cause discomfort, etc #337

Closed
gentlecolts opened this issue Oct 20, 2023 · 9 comments
Labels
duplicate This issue already exists. New Feature A new addition, whose complexity hasn't been evaluated yet

Comments

@gentlecolts
Copy link

gentlecolts commented Oct 20, 2023

Is your feature request related to a problem? Please describe.

Many common issues I've experienced that emerge from this platform's highly-interactive nature should provide options for opting out. Some examples include:

  • anchoring
  • knockback
  • personal space
  • posession of proxies
  • writing to user position, rotation, scale
  • screen space effects
  • forcably changing avatar
  • nonconsentual reparenting

Describe the solution you'd like

While these interactions are an emergent consequence of the fundamental design of this platform, and in many cases are part of the fun for a lot of people, users should have a means of opting out of these kinds of interactions. This opt-out should come in the form of native comfort settings which cannot be altered by in-world entities. It'd also be nice if we could, additionally, allow trusted users to be exempt from our personal protections, disable on a per-session basis, etc

Describe alternatives you've considered

Some of these can be mitigated by in-game protection systems, however these systems have several issues:

  1. A user has to discover them, it's not the "native experience"
  2. They are limited in what they can do, for example, no system can protect users from having to their transform written to without using hacky, unsuported means
  3. in-game systems can be circumvented, which can lead to arms-races that are unhealthy for the community at large

Additional Context

zangooseoo

@gentlecolts gentlecolts added the New Feature A new addition, whose complexity hasn't been evaluated yet label Oct 20, 2023
@gentlecolts
Copy link
Author

gentlecolts commented Oct 20, 2023

Some of these effects are also important for worlds, for example. It might be nice if worlds can have a prompt stating what permissions they want, (ex, an amusement park world may want to anchor users, a game world might want to apply knockback), allowing easy acquisition of these permissions where necessary. Thinking kind of like app store permissions

@SizemoreSystem
Copy link

I would really appreciate this

@JackTheFoxOtter
Copy link

I don't see how this could be disabled on an inidvidual level, but it could definitely be disabled on a world / session level, which I think is also covered by the plans for hard permissions. An option to disable this on the client side could lead to a lot of world breakage, but it would be nice if this can be at least communicated to the user before they join the world, in an abstract way kind of analog to how apps tell you what access they need before installing them. "In this world, systems can change your avatar" for example.

@gentlecolts
Copy link
Author

A lot of these are very "wishlist" items, things that I'd like to see in a perfect system. I definitely believe there's incremental steps that can be taken along the way, and this doesn't have to be implemented all at once. For example, having native protections built into the client as a start, then over time giving options for making it more granular would be, in my opinion, a good approach. There's a very "right now" problem of user comfort that needs to be addressed, imo, years ago, and fixing that problem should be a major priority.

@gentlecolts
Copy link
Author

gentlecolts commented Oct 20, 2023

I'm also not entirely concerned about world breakage. Ideally a system built around requesting permissions should emerge, but I personally see the current standard of free, no-consent interaction in this context to be a bug, not a feature

@JackTheFoxOtter
Copy link

I agree that this is an issue that needs addressing sooner rather than later. That's why I don't think a small, incremental fix is the way to go - instead, effort should be put into providing a robust implementation for hard permissions that allows session hosts much more granular fine control over what happens in their session, and transparently communicates to users what they should expect before joining the session.

@shiftyscales
Copy link
Collaborator

shiftyscales commented Nov 15, 2023

Most of the items listed here would be things covered by extensions to the existing permission system, e.g. 'hard permissions' which would provide the user the option to set/tailor their desired experience in sessions they host as far as what components/ProtoFlux would be allowed to be introduced to the session, etc.

A more important meta-level aspect of this issue would be in how these experience toggles are presented/communicated to the user, e.g. opting in/out to certain kinds of experiences, and presenting the user with a list of things they've opted out of that may be present in any sessions they choose to join.

In the interim, if you or others are being harassed by other users that are utilizing tooling that does these things against your consent, there are a number of things that can be done:

  • If you are a session host, restrict the permission level of the default role(s), modify the existing permissions for the existing roles, or otherwise be more selective in who you invite to your session
  • Making use of in-session/self-moderation tooling such as kicking, and/or banning/blocking users
  • If you've expressed your discomfort, and they continue to persist in unwanted interaction, that can be considered as grounds for harassment, and I would recommend opening a ticket at https://moderation.resonite.com/.

@epicEaston197
Copy link

Can we please get a official issue on the hard permission system if you wouldn't mind

@shiftyscales shiftyscales removed their assignment Nov 28, 2023
@shiftyscales
Copy link
Collaborator

I've since made an official issue for this in the form of #1103- so I'll be closing and merging this into that one.

@shiftyscales shiftyscales closed this as not planned Won't fix, can't repro, duplicate, stale Feb 29, 2024
@shiftyscales shiftyscales added the duplicate This issue already exists. label Feb 29, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
duplicate This issue already exists. New Feature A new addition, whose complexity hasn't been evaluated yet
Projects
None yet
Development

No branches or pull requests

5 participants