|
Author |
Thread Statistics | Show CCP posts - 24 post(s) |
|

CCP Guard
C C P C C P Alliance
173

|
Posted - 2011.09.21 16:12:00 -
[1] - Quote
CCP Sreegs, the chief of CCP's security forces, has written a dev blog on how to responsibly report security issues and make the world a better place. He also tells us a little bit about what's in it for those who do.
Check it out here and if questions arise, this comment thread is where you want to write them down.
CCP Guard | EVE Community Developer |
|
|

CCP Sreegs
C C P C C P Alliance
101

|
Posted - 2011.09.21 16:33:00 -
[2] - Quote
ConstantinValdor wrote:Plex for reporting a bot (that in turn is investigated and is warned/banned) = major help in the war against botting.
Reporting a bot itself really wouldn't qualify in this program. Reporting something like a new or privately created bot, or giving more valid insight into an organization with actionable information would. :) |
|
|

CCP Sreegs
C C P C C P Alliance
101

|
Posted - 2011.09.21 19:03:00 -
[3] - Quote
Callic Veratar wrote:I would like to see two new classes of petiton created:
- A Bug Petition, so that I don't have to leave the game, figure out where to go, created the bug report and flip back and forth to capture it in full detail. (Even better would be the ability to capture user input that triggers the bug.)
- A Security Petition, so that there's no question to where I go to report things. (Again, allowing me to log info through some form of capture mechanism would be great here too.)
Whether it's in the form of a petition or not this is something that we've been discussing internally and I know that removing the ambiguity is necessary. The other poster and yourself are right on in that reporting security incidents should be something that's more clear from an end-user perspective than being something that's just communicated in dev blogs and we do have some things in motion to rectify this. I'll be more comfortable speaking about what that will look like when it's finalized. |
|
|

CCP Sreegs
C C P C C P Alliance
101

|
Posted - 2011.09.21 19:03:00 -
[4] - Quote
Orisa Medeem wrote:I think one of the main problems is that a dev-blog only gets so much visibility, and only for so long.
If someone wants to report a security issue some six months from now there is some 95% chance he won't have read this blog (or any other blog from the security team for that matter), and even if he did it is quite possible he won't remember it.
That's probably why those four ways people try to raise security issues are so common.
The petition system is always there. You can create a petition from inside or outside the game.
I think promoting that "Exploits" sub-category to a category by its own would give it more visibility and, upon selecting it, the system could give the player better instructions of how to properly submit a security related issue. This would go a long way to ensure that the information reach the right people.
Quoting the other person who was right for great justice. |
|
|

CCP Sreegs
C C P C C P Alliance
101

|
Posted - 2011.09.21 19:09:00 -
[5] - Quote
Sentient Blade wrote:This dev blog is informative, but what it does not cover is CCPs response to those who may dedicate time to deliberately trying to identify bugs and security weaknesses, and what repercussions it may have upon them and their accounts.
Actually I think I'm pretty clear on that point, though it's not the point of the blog, and it brings me to a topic we didn't discuss mainly because I haven't confirmed that we can do it.
In essence, as I mentioned, we're not giving you license to hack our servers and any indication that this is being attempted will be treated as exactly that, you trying to hack our servers. There's not much I can do about that, as was stated in the blog. The logs are what the logs are and in a production environment it would be absolutely terrible practice to allow people to cause disruption or risk.
That being said, the point is 100% correct that part of the incentive should also be providing an atmosphere where you don't place yourself at risk via experimentation. What I'd like to facilitate is some form of environment where experimentation is possible without risk to the account. As it stands today if an exploit does occur the only thing that stands between yourself and administrative action is you letting us know that the exploit exists. If you discover something and you do not make us aware of it then our sole perspective both will and has to be that your intent was malicious. |
|
|

CCP Sreegs
C C P C C P Alliance
101

|
Posted - 2011.09.21 19:17:00 -
[6] - Quote
Aineko Macx wrote:malaire wrote:Sentient Blade wrote:This dev blog is informative, but what it does not cover is CCPs response to those who may dedicate time to deliberately trying to identify bugs and security weaknesses, and what repercussions it may have upon them and their accounts. Permanent ban of all your accounts on first offense of client exploiting. from Current Botting and Exploit/Client Modification Policies - 12/5/2011: Quote: One other thing to note is that at ALL levels all actions are levied against all of your accounts.
Client Modification or exploiting GÇô First Offense GÇô Permanent Ban
Unless this is changed people will be wary of reporting issues. It's not like people didn't learn from CCPs reactions... *cough*
Without getting into individual detail, as I've said before, never has their been a case where an exploit has been responsibly reported to us without abuse that anyone has ever been at risk or actioned against. I find it unfortunate that I can't wield godlike powers that prevent people from lying on the internet and I don't get a bonus for banning people and would prefer not to. I'd much rather have that creative energy channeled into making all of us a better product than investigating bad guys or playing he-said she-said with attention seeking criminals.
At the end of the day this is my initiative and if I didn't earnestly believe it was the best course of action I could have pumped out a pile of words about something else.  |
|
|

CCP Sreegs
C C P C C P Alliance
101

|
Posted - 2011.09.21 19:20:00 -
[7] - Quote
Ammzi wrote:CCP Screegs,
These security issues that you mention and hope to be able to identify a lot quicker now with the help of the player base, are they issues that you believe ordinary non-technical pilots can attempt to find/locate? In my opinion this opportunity for reward and helping CCP is more oriented towards the technical playerbase. Software engineers and similar.
What do you think?
regards Ammzi
That may be true in some respects but one of the great beauties of EVE is the social aspect and skullduggery, which may help explain the joking use of the word "snitches" in the blog. The fact is that if you give me an exploit and detail I'm going to reward you whether you discovered it or not. The reward is for the disclosure, not the discovery, if that spells it out any clearer. I'd like to encourage discovery as well in the long term, but at the end of the day my primary concern is fixing something that's broken. |
|
|

CCP Sreegs
C C P C C P Alliance
101

|
Posted - 2011.09.21 19:49:00 -
[8] - Quote
Tork Norand wrote: Sreegs, a (larger) thought....
Open up a new set of servers for EXACTLY that purpose...to let people hack on them in any way they want. To do this right, the user database would need to be scrubbed (in case someone did get in) but point to it and say, "That....That is where you can try and hack into. You find a route, you report it. If we see it used anywhere else, everyone using it on any server is banned."
I would go a few steps further...place it on it's own network with not access to the production or other test environments. Completely isolate it from anything else. To use it for any testing, the users need to reset their password on that cluster using a tool from outside that then updates their account on that cluster within the next 24 hours. Doing all of this would be a little time consuming, but not difficult. Updates of passwords could be performed by sending the hash in an email going from the registration page to the new cluster.....I could go on and on with this but that should be a good start for discussion.
That's pretty much essentially what we'd consider enabling, but as you so eloquently pointed out there are significant moving parts that need to be coordinated in order for that to happen, which is why I haven't firmly committed to it.
|
|
|

CCP Sreegs
C C P C C P Alliance
101

|
Posted - 2011.09.21 23:44:00 -
[9] - Quote
Manfred Sideous wrote:Screegs
YOU BEEN HAZED!
stop hazing me man |
|
|

CCP Sreegs
C C P C C P Alliance
101

|
Posted - 2011.09.21 23:49:00 -
[10] - Quote
darmwand wrote:Quote:That's pretty much essentially what we'd consider enabling, but as you so eloquently pointed out there are significant moving parts that need to be coordinated in order for that to happen, which is why I haven't firmly committed to it. Sounds interesting. Or at least allow people to easily get permissions to poke around a little, basically a mechanism where I could say "I'd like to do some weird things to your forums and, if I find anything, I'll report it back to you. In turn, you won't ban me for trying" would be cool. That said, I'm glad you are trying to get the community involved. Nice devblog.
The idea of whitelisting is certainly something I'd take into consideration, but I do have concerns about availability of services in that scenario. Something else I've considered to ease the burden is rotating services, which can be difficult due to interdependence, and running contests or something. Really this is exactly the type of feedback I'm hoping to obtain.
I really want to establish something that can harness the community, but I also want it to be interesting and worth everyone's while. I really don't just want to be like "Test crap is up" then a week later "ok I updated the list of guys here's your gold star". I want to facilitate engagement and a sense of ownership, but also give people a chance to contribute to something they enjoy and in some cases further their education. Our community has a ridiculous number of security professionals and security professional-to-be's. |
|
|
|

CCP Sreegs
C C P C C P Alliance
102

|
Posted - 2011.09.22 12:07:00 -
[11] - Quote
Florestan Bronstein wrote:CCP Sreegs wrote:Posting on the forums about it - This is also a bad idea. A really really bad idea as it is essentially an open disclosure, which leaves the system vulnerable to exploitation via the detailed method for the window it takes us to notice your post on the forums. not like the system is already vulnerable to exploitation before the vulnerability is discovered & reported, amirite? I don't have a set position on responsible vs immediate (full) disclosure but I think it needs to be acknowledged that while immediate disclosure may increase the probability of the vulnerability being actually exploited it also tends to minimize the time that the system is vulnerable (by applying maximum pressure to the developers) and gives users the ability to take precautions much faster/earlier than any company could issue them an advisory. The vulnerability does not start to exist when it is reported for the first time - if anything it becomes much less threatening once it has been reported and is known about (as users can then start to take precautions/use workarounds).
I disagree with you completely. While you may personally have the capacity to react the average user may not.
If the developers respond responsibly then there's really no point to disclosing openly immediately. There are certainly many documented cases of developers of various applications not reacting to security notifications in time, what we're trying to enable is a framework to prevent that.
:edit: In the absence of the developer actively shirking their responsibility the claim that they may potentially do so is dubious. One can't simply go through life using assumptions about how people or companies may or may not react to a situation as the basis for their decisions, which seems to be the crutch the most extreme full disclosure advocates cling to. |
|
|

CCP Sreegs
C C P C C P Alliance
102

|
Posted - 2011.09.22 12:09:00 -
[12] - Quote
Florestan Bronstein wrote:CCP Sreegs wrote:Filing a bug report - This suffers from a similar malady to the first. A lot of information comes into both of these systems and we wouldn't be doing anyone a service by spending our days weeding through bug reports. Assume I experience a bug "visiting website xyz in the IGB does sometimes make the browser "hang" (have to restart client to fix this) and leads in rare cases to a BSoD". I file a bug report describing this behavior and expressing mild annoyance at CCP for releasing such a shoddy product, the bug gets verified by volunteers or CCP staff, gets assigned to CCP's IGB team, gets prioritized ("only one website of over 9000 is known to cause this issue, telemetry says only three users experienced client crashes due to it in the last month") and some CCP dev will grab the bug report and look into it whenever he gets around to doing so. My guess would be that many users experience glitchy behavior due to accidentally triggering vulnerabilities and (if you are lucky) report it as a bug without thinking of it as more than a harmless but annoying glitch. Shouldn't there be some process of screening incoming bug reports for signs of potential vulnerabilities and fast-track those that might point towards a security issue?
In your example you directly state that the bug simply looks like glitchy behavior. In a world where a potential security (or not) vulnerability could mimic any behavior how would you propose this screening should work? |
|
|

CCP Sreegs
C C P C C P Alliance
102

|
Posted - 2011.09.22 23:03:00 -
[13] - Quote
MailDeadDrop wrote:CCP Sreegs wrote:All code that is written is peer reviewed and subject to rounds of internal testing. Prior to publication of the code, a reputable third party performs a vulnerability analysis of the codebase that will be published. Given how things played out with the first release of the new forums, I can conclude one of several things: 1. The procedures (above) were not in place at the time, and thus the peer and 3rd party reviews did not occur. 2. The procedures were in place but were not followed. 3. The "peers" and "reputable third parties" were incompetent. 4. The peers and/or 3rd parties reported the blatant security problems but CCP chose to do nothing. Care to tell us which it was? MDD
Yeah let me get right on that.
|
|
|

CCP Sreegs
C C P C C P Alliance
102

|
Posted - 2011.09.22 23:21:00 -
[14] - Quote
Yeah sorry dude, but framing a question in such a way that there's no good, or even honest answer isn't really going to get you the rosiest of replies on my best day. :)
The answer is that yes we did determine how we could improve the process and the process today is different from what it was then. The process today is what I'm describing. I think I went over some of the changes as well during a presentation at EVE Vegas which I think is being hosted by EVE Radio somewhere if you're curious. We knew what the issue was within an hour or two of it occurring, figuring out what needed to change in order to prevent that didn't really require a great deal. My shoe is on backwards how to I prevent? Put it on the right way.
Regarding the two factor tokens, let's just say I'm looking forward wholeheartedly to the day where I can say when they'll be deployed. :) |
|
|

CCP Sreegs
C C P C C P Alliance
106

|
Posted - 2011.09.23 11:45:00 -
[15] - Quote
T'Laar Bok wrote:CCP Sreegs wrote:incentivizing I cant decide if you got that from The Buzzword Dictionary or The Dictionary of Corporate Bullsh!t. Both available on Amazon if anyone is interested.
It means to give incentive. Hope that helps. |
|
|

CCP Sreegs
C C P C C P Alliance
106

|
Posted - 2011.09.26 16:20:00 -
[16] - Quote
Knalldari Testpilot wrote:Asking the EVE community for help in fixing security issues after banning Helicity Bonson for doing exact this could only be some kind of a hilarious troll. You guys have some strange humor...  //off topic The new forum is less useful/handy/effective than the old one.
Can you please let me know what part of "We've never banned anyone for reporting a security issue" was unclear? I can't speak to the specifics of any user you might be referring to as we don't publically discuss administrative actions as a matter of policy, but I can categorically define your post as patently false and ask you to refrain from spreading such falsehoods on this forum as it can be detrimental to what we're trying to do, which is encourage people to participate. |
|
|

CCP Sreegs
C C P C C P Alliance
106

|
Posted - 2011.09.26 16:23:00 -
[17] - Quote
mazzilliu wrote:Although a 15$ plex isn't a whole lot of incentive to put forth the unknown number of hours necessary to find an undiscovered vulnerability, it is rather fun and there aren't a whole lot of opportunities for sanctioned hacking against a company's resources.
sreegs, does this bounty also apply to the whitewolf and dust websites, that are also hosted on the same IP as eveonline.com?
edit: to clarify, we need a specific list of what is sanctioned and what is not. because currently any hacking involving the client itself is bannable at the same time as this rewards program for hacking web resources, even when the activity isn't malicious or used to generate illegitimate isk. can i attack client network traffic without injecting code into the running process itself? how far does this go?
What's not sanctioned at this time is any active exploitation or testing in any CCP owned environments. This thread is merely for comment so that we can gauge how best to institute, perhaps, a testing environment. Attacking our infrastructure was and remains a crime.
What I'd like to hear are thoughts as to what type of environment you feel would be useful. In addition we do get reports of things discovered anecdotally and those we encourage and reward. |
|
|

CCP Sreegs
C C P C C P Alliance
106

|
Posted - 2011.09.26 16:26:00 -
[18] - Quote
Internet Knight wrote:Report one significant issue: how much time was invested by the player in researching the exploit? How much time was invested in internal research to verify the exploit? If released publicly, how much damage could have been caused? Math: (Invested time * damage multiplier) / 20% fairness = reward in PLEX rounded up
Report multiple issues: offer them a job because clearly it's better to have them on NDA than not.
The "hire the hacker" mentality simply has no real world application when you start to discover that you need to be able to trust the person you'd be hiring and they've already shown themselves to be willing to break laws. Where it starts to make more sense is when you can set up a controlled environment where they can operate ethically. |
|
|

CCP Sreegs
C C P C C P Alliance
106

|
Posted - 2011.09.26 16:27:00 -
[19] - Quote
mazzilliu wrote:Internet Knight wrote:Report one significant issue: how much time was invested by the player in researching the exploit? How much time was invested in internal research to verify the exploit? If released publicly, how much damage could have been caused? Math: (Invested time * damage multiplier) / 20% fairness = reward in PLEX rounded up this is ultimately what it will boil down to if you want people investing serious time into this. the sort of person with the skills necessary makes much more than 15$(one plex) in a single hour of work, and assuming that all the obvious security holes detectable by vulnerability scanners are gone, we're talking multiple hours of effort going into this to produce one security hole. So one plex does not even factor in the amount of incentive there is. the only real remaining incentives, are name recognition, and "we won't sue you". which can be significant for some people. but time will tell if it's enough to produce a decent crop of vulnerabilities. if CCP were paying market rates for this sort of work we would be seeing a year's worth of plex or more instead, which might motivate people who are less than 90000% enthusiastic about putting ' and < in every single url and text box, and figuring out ******** input filters and stuff like that. Mozilla is paying up to 3 grand, chrome paying even more than that. To scale it down to an organization CCP's size, 1 or 2 hundred sounds reasonable. And it's not even cash. the only thing the plex actually costs ccp is potential lost revenue.
CCP isn't going to be throwing you hundred dollar bills ever so we can go ahead and write that off for the time being. :) |
|
|

CCP Sreegs
C C P C C P Alliance
106

|
Posted - 2011.09.26 16:29:00 -
[20] - Quote
Garia666 wrote:Here is a free tip never have multiple accounts on 1 email. You can be banned for no apperent reason. So when you have change it asap
I'm pretty sure there are threads for conspiracy theories or trolling somewhere on this forum, but this one isn't it. Please refrain and stick to the topic.  |
|
|
|

CCP Sreegs
C C P C C P Alliance
106

|
Posted - 2011.09.27 12:12:00 -
[21] - Quote
mazzilliu wrote:CCP Sreegs wrote:mazzilliu wrote:Although a 15$ plex isn't a whole lot of incentive to put forth the unknown number of hours necessary to find an undiscovered vulnerability, it is rather fun and there aren't a whole lot of opportunities for sanctioned hacking against a company's resources.
sreegs, does this bounty also apply to the whitewolf and dust websites, that are also hosted on the same IP as eveonline.com?
edit: to clarify, we need a specific list of what is sanctioned and what is not. because currently any hacking involving the client itself is bannable at the same time as this rewards program for hacking web resources, even when the activity isn't malicious or used to generate illegitimate isk. can i attack client network traffic without injecting code into the running process itself? how far does this go? What's not sanctioned at this time is any active exploitation or testing in any CCP owned environments. This thread is merely for comment so that we can gauge how best to institute, perhaps, a testing environment. Attacking our infrastructure was and remains a crime. What I'd like to hear are thoughts as to what type of environment you feel would be useful. In addition we do get reports of things discovered anecdotally and those we encourage and reward. finding some xss in your site or something like that is attacking your infrastructure and also a crime(and also has been rewarded by CCP in the past). needs more clarification. edit: to clarify my own point, we need some clarification of what is and is not acceptable. the guy who got banned did so because he was reading secret forums, while being "logged in" as an employee, which clearly shows he didn't understand the situation as he would have either concealed his identity or else didn't try to find secret information if he did. i'm not asking ccp to "talk about administrative actions" but it's clear that there was misunderstanding going on and there need to be clearly laid out rules for people to report weaknesses and guarantee their own safety in doing so. whether a javascript alert box is thought of as active malicious exploitation or agreeable proof of concept for vulnerability reporting, is entirely in the eye of the beholder, in this case CCP. other entities would wholly disagree with whatever definition you come up with, so you must be crystal clear in what you say. you have a singularity test server, where AFAIK it's anything goes except taking down services, however most of your web resources do not have a publicly available backup, so any actual vuln testing has to be done on production machines. which could or could not be a big deal, depending on the vulnerability and your current stance. if you are asking people to test on production servers, if there is a denial of service or sql injection bug the question really becomes, how do we report this without being malicious or getting banned, and will ccp need to conduct an investigation to ensure the bug(now known by 3rd parties) was never maliciously exploited? as i understand it this blog is basically an invitation for people to go around vuln scanning(be it manual or automated) on production servers and try to find vulnerabilities without taking down services or stealing secret information, etc. if this is a mistaken idea, then i apologize and you really need to clarify. also a list of acceptable locations where rewards will be given for vulnerabilities would be appreciated. nobody likes their time being wasted, and i'm sure you don't like getting vuln reports for web resources you don't even manage.
I just did tell you what's acceptable. :) Don't attack our infrastructure. I understand that's not an optimal answer from a wanting to help perspective, and it's something I'm working to get around, but at the end of the day we can't have people wantonly attacking our systems. In the long term I'm looking into setting up an environment to be used for these purposes.
The only misunderstanding seems to stem from the fact that people want to believe that attacking systems is ok if they claim they were trying to help after the fact. I'm telling you in no uncertain terms, with no ambiguity whatsoever, that attacking our systems FOR ANY REASON is not allowed. Be that a website, the EVE servers or any other property belonging to CCP hf. As I said in the blog logs don't tell me what your intent is. If you want to help I want to work with you on a framework to enable it. That's not open license to attack a company's systems and shouldn't be misinterpreted as such. Prior to this there was no conversation at all regarding such and no reason for ANYONE to believe they had any license to do so. License was never in the past and will never in the future be given to do ANY kind of testing on production systems. I don't see any way to misunderstand that but give it a shot! :)
The blog, as is stated is a request for information about what you'd like to see in a system set up for this, and a statement about rewards for data collected anecdotally. I really don't see it as a license to attack our systems and it shouldn't be interpreted as such. |
|
|

CCP Sreegs
C C P C C P Alliance
106

|
Posted - 2011.09.27 14:27:00 -
[22] - Quote
mazzilliu wrote:CCP Sreegs wrote:
I just did tell you what's acceptable. :) Don't attack our infrastructure. I understand that's not an optimal answer from a wanting to help perspective, and it's something I'm working to get around, but at the end of the day we can't have people wantonly attacking our systems. In the long term I'm looking into setting up an environment to be used for these purposes.
The only misunderstanding seems to stem from the fact that people want to believe that attacking systems is ok if they claim they were trying to help after the fact. I'm telling you in no uncertain terms, with no ambiguity whatsoever, that attacking our systems FOR ANY REASON is not allowed. Be that a website, the EVE servers or any other property belonging to CCP hf. As I said in the blog logs don't tell me what your intent is. If you want to help I want to work with you on a framework to enable it. That's not open license to attack a company's systems and shouldn't be misinterpreted as such. Prior to this there was no conversation at all regarding such and no reason for ANYONE to believe they had any license to do so. License was never in the past and will never in the future be given to do ANY kind of testing on production systems. I don't see any way to misunderstand that but give it a shot! :)
The blog, as is stated is a request for information about what you'd like to see in a system set up for this, and a statement about rewards for data collected anecdotally. I really don't see it as a license to attack our systems and it shouldn't be interpreted as such.
I think the issue is that we don't agree on the definition of attack or testing. for me, i have to operate under the assumption that an attack is a single 'or 1=1, or a single unauthorized failed login. based on my knowledge of past happenings with ccp, something seems to only be considered an attack when secret info is viewed, or there is a denial of service. IMO, "testing" and "attacking" would be required to accomplish this: Quote:The Good Example - User sends an email to [email protected] which reads "Dearest CCP Sreegs, I have come across a cross site scripting vulnerability in your forum. Here is some sample exploit code which I have used to prove my concept" People in different roles than either of us probably have an even different idea of what these words mean. Clearly some users at the release of this forum software had a vastly different idea of what malicious activity meant. I propose the following rules to clarify for all parties regardless of their knowledge of how to handle security incidents: -no taking down services -no viewing secret information, as you can't undo your actions on the internet don't even try to get close -if you must test if something can be used against another user, use it only on your alt and not even a consenting 3rd party, as knowledge of the exploit could spread -no sharing knowledge of a live exploit with any other person -no exploiting for personal gain -no corrupting the integrity of information owned by other users. i think this sort of thing needs to be crystal clear for the users out there.
I'm telling you in no uncertain terms, again, that from the log's perspective there's no difference between a "test" and an "attack". If that's too difficult or nuanced to be clear then let's just say don't "test" either. I don't think it's clear what anyone thought at any time because I'm not psychic and I'm not going to ever be unless something awesome happens.
I propose the following:
Don't test, don't attack and don't in any way shape or form attempt to use systems for anything other than their intended purpose.
That is production systems. When it comes to a system specifically built for this purpose then the bulk of your proposed rules would make sense with some additions that I'll touch on when I have a free minute. |
|
|

CCP Sreegs
C C P C C P Alliance
106

|
Posted - 2011.09.27 14:48:00 -
[23] - Quote
It's something I'm looking into. I haven't decided how to structure it yet though really so sisi may not be the best example. For instance, does it make more sense to have a sisi up all the time or to hold a kind of contest? For the next x time pound away at this here's where it is, and rotate those things out with maybe larger prizes going to winners.
I'm curious whether you think that might be more impactful than just having it up and running 24/7, and also provide a lot more incentive to the individual. |
|
|

CCP Sreegs
C C P C C P Alliance
106

|
Posted - 2011.09.29 11:22:00 -
[24] - Quote
Garia666 wrote:CCP Sreegs wrote:Garia666 wrote:Here is a free tip never have multiple accounts on 1 email. You can be banned for no apperent reason. So when you have change it asap I'm pretty sure there are threads for conspiracy theories or trolling somewhere on this forum, but this one isn't it. Please refrain and stick to the topic.  what are you smoking this is no conspiracy, this is true facts. and we are talking about security this a very helpfull tip for the people playing this game.. Not something you might want to hear i am sure..
Yes, because clearly from an account security perspective it is a good idea for you to maintain 12 different email accounts, or use one you could lose access to, which would then leave you in the position of not being able to access your account. Nevermind the fact that your insinuation that we randomly ban people is a flat-out falsehood. Not liking why you were banned or choosing not to recognize that you've violated the terms of an agreement don't mean there was no reason.
In short, I've asked you once not to mislead our customers, provide them with bad information or mischaracterize our actions with conspiracy theories about account actions. Your advice is simply terrible for the end user and has no place in this thread regardless.
If you have an opinion on disclosures or security testing I'd love to hear them. Otherwise take the less than subtle hint and refrain from posting unrelated FUD in the thread devoted to security testing and disclosures. |
|
|
|
|