@SalC1
  @SalC1
SalC1 | How This Public Image was Used to Find 1000s of 2b2t Bases @SalC1 | Uploaded September 2021 | Updated October 2024, 17 hours ago.
NOCOM was by far one of the biggest exploits 2b2t has even encountered. And one player took full advantage of the public NOCOM data as many bases as possible. Let's see how he did it.

NOCOM Animation: cdn.discordapp.com/attachments/737054779582185522/864051484203286529/nocomment_teaser_trailer.mp4
NOCOM GitHub Explanation: github.com/nerdsinspace/nocom-explanation/blob/main/README.md

Join my Discord Server! salc1.com/discord
How This Public Image was Used to Find 1000s of 2b2t BasesThe Fall of a Base I Called Home - A 2b2t StoryHow I Found my Own Duplication Glitch on 2b2tMy First Group - A 2b2t StoryThe 2011 Spawn Base that Barely Survived - 2b2tThe Useless History of Chainmail Armor in MinecraftDuping on a pay-to-win Minecraft PVP Server - Snapcraft Ep. 1What Its Like to Run a Minecraft Anarchy ServerExploring 2b2t AlternativesI  DIDN’T Migrate my Minecraft Account - Here’s What HappenedGriefing My Own Base on 2b2t2b2t - The Base That Could Have Been

How This Public Image was Used to Find 1000s of 2b2t Bases @SalC1

SHARE TO X SHARE TO REDDIT SHARE TO FACEBOOK WALLPAPER