Technologies
11 Tips for Getting Started in Metal Gear Solid Delta: Snake Eater
From cutscene tips to early item grabs, here’s my advice for getting started with the remake of one of my personal favorite Metal Gear games.

Metal Gear Solid Delta: Snake Eater is the best way to play one of the greatest Metal Gear games of all time. However, like most Hideo Kojima games, the Metal Gear Solid series features unique gameplay and mechanics. Whether you’re a veteran fan of the series or experiencing Snake Eater for the very first time, the new modes and gameplay tweaks will be sure to satisfy you.
Here are 11 tips to keep in mind when jumping into Metal Gear Solid Delta.
Pause cutscenes if you need to
Hideo Kojima’s games are known for their long cutscenes, and Snake Eater is no different. The majority of your first few hours will feature very minimal gameplay. And while the cutscenes are exciting and bizarre, you can pause them to take a break without risking skipping them entirely. Pause any cutscene by hitting the menu button and if you want to skip, you’ll see the option for that, too. It’s also worth mentioning that you can hit the same button to pause lengthy radio conversations as well.
Swap camo often
Snake Eater can be played like a run-and-gun shooter, but a stealthy approach is generally better, and utilizing your various outfits and facepaint will maximize your evasiveness. Make sure to change your appearance often to match your surroundings. And to make swapping even quicker, hold up on the D-pad to access a quick change menu.
Keep an eye on camo percentage
The game will give you a higher stealth rating the better you blend in, so make sure to watch your camo percentage. As you move around the environment, a percentage at the bottom will show you how hidden you are. The higher the number, the less likely an enemy will spot you. Bonus tip: There’s a trophy you can unlock if you bring your camouflage over 90%.
Call your team often
Throughout the game you’ll unlock more and more allies to call and chat with on the radio. These conversations can range from hints on how to proceed to how you save your game. Calling teammates often will give you bonus dialogue about events that you just witnessed or played through. They’ll even offer fun anecdotes or just chat with Snake.
Be aware of time paradoxes
Snake Eater is a prequel entry in the Metal Gear Solid franchise. This means that you can’t deviate too far from the main story because it would mess with events that take place in MGS 1 and 2. If you do, you can create literal Time Paradoxes resulting in game over screens and humorous lectures from your team.
One such example is killing Ocelot after meeting him for the first time. To proceed, you need to leave him unconscious on the ground — stabbing him with your knife will disrupt the canon. However, you can stab him anyway if you want a trophy.
Keep an eye out for R1 prompts in cutscenes
Snake Eater has unique cutscenes where at specific moments, you can swap camera angles to see what Snake is looking at. You’ll miss out on important visuals while the game just shows your character looking into binoculars, for example. When you see the R1 icon show up in the screen’s corner, make sure to hit it. However, do keep in mind that this game is a product of an older era and sometimes you’ll realize Snake is just staring at a woman’s chest.
You can change settings to drag bodies easier
Hiding bodies is important to keep alert levels down. You can lift and drag someone by holding down the Square button, but doing so can be kind of annoying. In the settings menu you can select to change carrying from a button hold to a simple button press. This gives you back your right thumb in order to regain camera control while dragging someone out of sight.
Use silencers, but recognize when you don’t need them
Trust me on this, stealth is your friend in this game. It’s harder to pull off, but worth it. This means silencers are quite important for avoiding gun fights and staying hidden. However, silencers can wear down and won’t last forever. To avoid overusing them, remove the silencers anytime you engage in a big gun fight or boss battle. If the enemy already knows you’re there, there’s no point wasting the silencer.
Grab the thermal goggles early
One of the most useful pieces of equipment is the thermal goggles. It allows you to see enemies through walls and will help spot bosses during big fights. They can be collected pretty early in the game too. The second time you reach the destroyed base that housed Sokolov, check in the locker in his room.
Don’t miss the early machine gun
If you’re wanting to take the loud route through the game, there’s a machine gun stashed away quite early in Snake Eater. At the first bridge you encounter, where the game has you use a beehive to scare off an enemy, the gun is located in a small cave underneath. You can reach it by crossing the bridge and then circling around the ledge to the left. You need to grab the gun the first time you get to the bridge, though. The next time the gun will be gone and you’ll only find ammo.
Become the snake eater
You can hunt and eat various animals in the game for stat and health rewards. Find a snake, eat the snake, get the Snake Eater Trophy.
With those 11 tips you’ll now start off on a much stronger footing when playing through Metal Gear Solid Delta.
Metal Gear Solid Delta: Snake Eater comes out on PlayStation 5, Xbox Series, and PC on Aug. 28.
Technologies
A New Bill Aims to Ban Both Adult Content Online and VPN Use. Could It Work?
Michigan representatives just proposed a bill to ban many types of internet content, as well as VPNs that could be used to circumvent it. Here’s what we know.
On Sept. 11, Michigan representatives proposed an internet content ban bill unlike any of the others we’ve seen: This particularly far-reaching legislation would ban not only many types of online content, but also the ability to legally use any VPN.
The bill, called the Anticorruption of Public Morals Act and advanced by six Republican representatives, would ban a wide variety of adult content online, ranging from ASMR and adult manga to AI content and any depiction of transgender people. It also seeks to ban all use of VPNs, foreign or US-produced.
Don’t miss any of our unbiased tech content and lab-based reviews. Add CNET as a preferred Google source.
VPNs (virtual private networks) are suites of software often used as workarounds to avoid similar bans that have passed in states like Texas, Louisiana and Mississippi, as well as the UK. They can be purchased with subscriptions or downloaded, and are built into some browsers and Wi-Fi routers as well.
But Michigan’s bill would charge internet service providers with detecting and blocking VPN use, as well as banning the sale of VPNs in the state. Associated fines would be up to $500,000.
What the ban could mean for VPNs
Unlike some laws banning access to adult content, this Michigan bill is comprehensive. It applies to all residents of Michigan, adults or children, targets an extensive range of content and includes language that could ban not only VPNs but any method of bypassing internet filters or restrictions.
That could spell trouble for VPN owners and other internet users who leverage these tools to improve their privacy, protect their identities online, prevent ISPs from gathering data about them or increase their device safety when browsing on public Wi-Fi.
Read more: CNET Survey: 47% of Americans Use VPNs for Privacy. That Number Could Rise. Here’s Why
Bills like these could have unintended side effects. John Perrino, senior policy and advocacy expert at the nonprofit Internet Society, mentioned to CNET that adult content laws like this could interfere with what kind of music people can stream, the sexual health forums and articles they can access and even important news involving sexual topics that they may want to read. «Additionally, state age verification laws are difficult for smaller services to comply with, hurting competition and an open internet,» John added.
The Anticorruption of Public Morals Act has not passed the Michigan House of Representatives committee nor been voted on by the Michigan Senate, and it’s not clear how much support the bill currently has beyond the six Republican representatives who have proposed it. As we’ve seen with state legislation in the past, sometimes bills like these can serve as templates for other representatives who may want to propose similar laws in their own states.
Could VPNs still get around bans like these?
That’s a complex question that this bill doesn’t really address. When I asked NordVPN how easy it would be track VPN use, privacy advocate Laura Tyrylyte explained, «From a technical standpoint, ISPs can attempt to distinguish VPN traffic using deep packet inspection, or they can block known VPN IP addresses. However, deploying them effectively requires big investments and ongoing maintenance, making large-scale VPN blocking both costly and complex.»
Also, VPNs have ways around deep packet inspection and other methods. CNET senior editor Moe Long mentioned obfuscation like NordWhisper, a counter to DPI that attempts to make VPN traffic look like normal web traffic so it’s harder to detect.
There are also no-log features offered by many VPNs to guarantee they don’t keep a record of your activity, and no-log audits from third parties like Deloitte that, well, try to guarantee the guarantee. There are even server tricks VPNs can use like RAM-only servers that automatically erase data each time they’re rebooted or shut down.
If you’re seriously concerned about your data privacy, you can look for features like these in a VPN and see if they are right for you. Changes like these, even on the state level, are one reason we pay close attention to how specific VPNs work during our testing, and make sure to recommend the right VPNs for the job, from speedy browsing to privacy while traveling.
Correction, Oct. 9: An earlier version of this story incorrectly stated how RAM-only servers work. RAM-only servers run on volatile memory and are wiped of data when they are rebooted or shut down.
Technologies
AWS Outage Explained: Why Half the Internet Went Down While You Were Sleeping
Reddit, Roblox and Ring are just a tiny fraction of the hundreds of sites and services that were impacted when Amazon Web Services went down.
The internet kicked off the week the way that many of us often feel like doing: by refusing to go to work. An outage at Amazon Web Services (AWS) rendered huge portions of the internet unavailable on Monday morning, with sites and services including Snapchat, Fortnite, Venmo, the PlayStation Network and, predictably, Amazon, unavailable for a short period of time.
AWS is a cloud services provider owned by Amazon that props up huge portions of the internet. As with the Fastly and Crowdstrike outages over the past few years, the AWS outage shows just how much of the internet relies on the same infrastructure — and how quickly our access to the sites and services we rely on can be revoked when something goes wrong.
Just after midnight PT on October 20, AWS first registered an issue on its service status page, saying it was «investigating increased error rates and latencies for multiple AWS services in the US-EAST-1 Region.» Around 2 a.m. PT, it said it had identified a potential root cause of the issue, and within half an hour, it had started applying mitigations that were resulting in significant signs of recovery.
«The underlying DNS issue has been fully mitigated, and most AWS Service operations are succeeding normally now,» AWS said at 3.35 a.m. PT. The company didn’t respond to request for further comment beyond pointing us back to the AWS health dashboard.
Around the time that AWS says it first began noticing error rates, Downdetector saw reports begin to spike across many online services, including banks, airlines and phone carriers. As AWS resolved the issue, some of these reports saw a drop off, whereas others have yet to return to normal. (Disclosure: Downdetector is owned by the same parent company as CNET, Ziff Davis.)
Around 4 a.m. PT, Reddit was still down, while services including Verizon and YouTube were still seeing a significant number of reported issues.
Technologies
Verum Messenger: How to Protect Your Personal Data and Why Choosing a Secure Messenger Matters
Verum Messenger: How to Protect Your Personal Data and Why Choosing a Secure Messenger Matters
A major data leak has been reported involving users of the Russian messenger MAX. Hackers claimed to have obtained the platform’s entire database, which includes 46,203,590 records. To prove their claims, they published part of the stolen data publicly.
According to preliminary information, the attackers gained access to users’ personal details, including contact numbers, chats, IP addresses, and other sensitive data. Cybersecurity experts warn that such incidents can lead to serious consequences — from account takeovers and extortion to large-scale phishing attacks.
Why these leaks happen
The main cause of such breaches is the storage of personal user data on servers without adequate protection or encryption. If attackers gain access to these servers, users’ information becomes fully exposed.
Additionally, many popular messaging apps require users to register with a phone number and provide extra personal information, increasing the amount of data that can be stolen.
How to reduce the risks
The only reliable way to protect your personal messages and data is to use messaging platforms that do not store personal information on their servers and rely on true end-to-end encryption.
One such solution is Verum Messenger — a next-generation app built on the principle of maximum privacy. The platform:
- does not store users’ personal data;
- uses unique encryption keys generated locally on the user’s device;
- does not require a phone number or other personal information to register;
- has no access to messages, calls, or files;
- provides effective anti-spam and anti-scam protection;
- offers private chats and group channels with flexible security settings.
Even in the event of a server breach, attackers would not be able to access message content — because encryption keys simply do not exist on the company’s side.
Freedom of communication without the risk of leaks
In addition to its strong security foundation, Verum Messenger offers a built-in ecosystem of tools — from encrypted email Verum Mail and an integrated VPN for anonymous connections to free crypto mining with Verum Coin and eSIM connectivity in over 150 countries worldwide.
As data breaches become increasingly common, choosing a secure messenger is no longer just about convenience — it’s about personal safety.
-
Technologies3 года ago
Tech Companies Need to Be Held Accountable for Security, Experts Say
-
Technologies3 года ago
Best Handheld Game Console in 2023
-
Technologies3 года ago
Tighten Up Your VR Game With the Best Head Straps for Quest 2
-
Technologies4 года ago
Verum, Wickr and Threema: next generation secured messengers
-
Technologies4 года ago
Black Friday 2021: The best deals on TVs, headphones, kitchenware, and more
-
Technologies4 года ago
Google to require vaccinations as Silicon Valley rethinks return-to-office policies
-
Technologies4 года ago
Olivia Harlan Dekker for Verum Messenger
-
Technologies4 года ago
iPhone 13 event: How to watch Apple’s big announcement tomorrow