You know, my brother uses a program referred to now he can exploit minerals and repair the damaged item to our team. This action does not need too many tasks and if there are only a few seconds for an operation. If you rely on the IP system can be mistaken that this is a case of violation
uuuuummmm, im kind of wondering what do you mean your brother uses a program to exploit minerals? like a mining bot?