| Pages: 1 2 3 [4] 5 6 :: one page |
| Author |
Thread Statistics | Show CCP posts - 31 post(s) |
|

CCP Sreegs
C C P C C P Alliance
90

|
Posted - 2011.04.07 19:32:00 -
[91] - Quote
SpaceSquirrels wrote:What client side implementations are you striving for? Where do you plan on fixing the "the holes"?
Why not undertake current systems in use EG: punkbuster, VAC. What plans do you have for MACRO type bots EG: Mouse tracing etc? (Why is not not possible to implement "monitors" akin to what browser analytics use? Essentially take a fingerprint of actions and movements taken?
I see the largest problem as the client side python injections...as people can upload their own scripts to program their own AI.
What sort of security features are there for packet transfers?
Granted there will always be exploits, but to reiterate whats the overall plan?
We're not going to go into deep details about the specifics of our implementation. We chose not to use an external vendor for various reasons I also don't want to get into, but basically I think we can do a better job in-house. We are aware of OCR bots and have plans to deal with them. Python injection as well.
What we're going to do is over time give you guys some more information about the research we're doing to institute additional security in the form of dev blogs or whitepapers. We will not, however, be documenting specific controls. |
|

randomname4me
A Priori LLC
55
|
Posted - 2011.04.07 19:35:00 -
[92] - Quote
Vincent Athena wrote:Some courier bots run on trial accounts with virtually untrained pilots. A ban of such an account seems like it would not be a deterrence, even if you upped it all the way to a one strike perma-ban. The botter can easily start a new trial. Any ideas on what would be a deterrent to these botters? All I can think of is isk removal from whatever account collects the isk. Prevent trials from being able to access anything but the most basic (IE not worth botting) currier missions.
|
|

CCP Sreegs
C C P C C P Alliance
90

|
Posted - 2011.04.07 19:35:00 -
[93] - Quote
Steelshine wrote:In the security panel, something was mentioned about besides attacking bots directly(which is good), to alter content.
ie. If the current pve content (watching three bars turn red while orbiting) or staring at lasers punch rocks for hours is whats giving people a reason to bot, that it was something worth looking into.
any comments on this?
I think some people probably bot because of how repetitive certain pve activities can be.
Yes, we have someone from Game Design on the team specifically to think about issues like this among other things, though I mean issues LIKE this and not necessarily this exactly. |
|
|

CCP Sreegs
C C P C C P Alliance
90

|
Posted - 2011.04.07 19:37:00 -
[94] - Quote
Vincent Athena wrote:Bot war report: Jita price trends.
Minerals: rather stable. Actually as some bots increase mineral supply, and others, via "earning" isk eventually increase mineral demand, we may not see much effect here.
Ice: Some upward movement in isotope prices. These moved up about 10% a week ago, then stabilized at the new level.
PLEX: Bot accounts consume PLEX, but the price has only dropped a tiny amount in the last week.
Implants: I checked attribute implants. Basics (+3) have increased a bit, others have been stable.
Overall the effect on the market has been tiny. All I'm seeing could easily just be normal market noise. To date the idea that bots are needed to make the EVE economy work is not supported by market data at any level.
CCP Sreegs: Some courier bots run on trial accounts with virtually untrained pilots. A ban of such an account seems like it would not be a deterrence, even if you upped it all the way to a one strike perma-ban. The botter can easily start a new trial. Any ideas on what would be a deterrent to these botters? All I can think of is isk removal from whatever account collects the isk.
This has been discussed but I don't recall how deeply. It's on my list to discuss later. I will say that we are paying careful attention to any areas where one might be able to throwaway and mass generate isk making characters in short periods of time. (Game Design) |
|

Messoroz
The Penetrators The Laughing Men
9
|
Posted - 2011.04.07 19:52:00 -
[95] - Quote
CCP Sreegs wrote:SpaceSquirrels wrote:What client side implementations are you striving for? Where do you plan on fixing the "the holes"?
Why not undertake current systems in use EG: punkbuster, VAC. What plans do you have for MACRO type bots EG: Mouse tracing etc? (Why is not not possible to implement "monitors" akin to what browser analytics use? Essentially take a fingerprint of actions and movements taken?
I see the largest problem as the client side python injections...as people can upload their own scripts to program their own AI.
What sort of security features are there for packet transfers?
Granted there will always be exploits, but to reiterate whats the overall plan? We're not going to go into deep details about the specifics of our implementation. We chose not to use an external vendor for various reasons I also don't want to get into, but basically I think we can do a better job in-house. We are aware of OCR bots and have plans to deal with them. Python injection as well.
Let me add that punkbuster and VAC can't deal with ring 0 hacks/bots easily >:) |

SpaceSquirrels
Volatilis Legion Citex Alliance
0
|
Posted - 2011.04.07 19:57:00 -
[96] - Quote
Quote:We're not going to go into deep details about the specifics of our implementation. We chose not to use an external vendor for various reasons I also don't want to get into, but basically I think we can do a better job in-house. We are aware of OCR bots and have plans to deal with them. Python injection as well.
What we're going to do is over time give you guys some more information about the research we're doing to institute additional security in the form of dev blogs or whitepapers. We will not, however, be documenting specific controls.
I understand about not getting into specifics here and now...or revealing the magicians secrets as it were... (To do so could compromise the very thing you're looking to do) Just seems like a lack of info. It's one thing to say you're looking into it its another saying we have a plan!!! and we have steps for that plan!
Furthermore does CCP issue "hardware bans"? If no why not? I rather liked Curt Schilling's (Or who ever that guy is creating a new mmo) analogy. "If someone at Disneyland is being disruptive or what have you they kick them outta the park they dont put time in time out"
Granted it's not needed for minor things. However over coming a hardware ban (especially the ones that look at CPU and Mobo info) is a lot more of a pain in the ass than starting another account...in which people might just get for free anyway.
Like I said good to hear you guys have an idea for plan, but we really need that dev blog you spoke of to come out and say what the plan/s are, and how effective you believe them to be.
BTW thank you for the prompt reply.
Also yes to others i'm well aware that no anti cheating mechanism is 100%... This has been established. |

Messoroz
The Penetrators The Laughing Men
9
|
Posted - 2011.04.07 19:59:00 -
[97] - Quote
SpaceSquirrels wrote: Furthermore does CCP issue "hardware bans"? If no why not? I rather liked Curt Schilling's (Or who ever that guy is creating a new mmo) analogy. "If someone at Disneyland is being disruptive or what have you they kick them outta the park they dont put time in time out" .
It takes very little effort to spoof a good chunk of hardware IDs on your computer. |

clixor
CMS-17 Initiative CMS-17 Expanse
0
|
Posted - 2011.04.07 20:05:00 -
[98] - Quote
CCP Sreegs wrote: This has been discussed but I don't recall how deeply. It's on my list to discuss later. I will say that we are paying careful attention to any areas where one might be able to throwaway and mass generate isk making characters in short periods of time. (Game Design)
This is why marking portraits could be useful. Some of these bots chars sell implants. Traders could be not aware that they're doing transactions with botters. |

Barakkus
370
|
Posted - 2011.04.07 20:07:00 -
[99] - Quote
Messoroz wrote:SpaceSquirrels wrote: Furthermore does CCP issue "hardware bans"? If no why not? I rather liked Curt Schilling's (Or who ever that guy is creating a new mmo) analogy. "If someone at Disneyland is being disruptive or what have you they kick them outta the park they dont put time in time out" .
It takes very little effort to spoof a good chunk of hardware IDs on your computer.
This pretty much...
...that and you can disable tracking a lot of that **** pretty easily... |

Malcanis
Alcohlics Anonymous
7
|
Posted - 2011.04.07 20:30:00 -
[100] - Quote
Alua Oresson wrote:It's low sec, name the system. I'm sure some vigilantes will want to visit from time to time.
Ingunn |

Florestan Bronstein
Element 115. Test Alliance Please Ignore
21
|
Posted - 2011.04.07 20:34:00 -
[101] - Quote
CCP Sreegs wrote:We are aware of OCR bots and have plans to deal with them. Python injection as well. Maybe I am reading too much into that reply but of the three most important bot categories you list only two.
What about plain process injection/hooking (whether this is done via InnerSpace or otherwise)?
Both (combat) mission bots I am currently aware of hook into the EVE client via InnerSpace - and if I were concerned about the health of the game that's the group of bots I would be most worried about.
Missions running bots would be pretty painful to construct based on an OCR system & hardening the EVE client against Python injections looks like a relatively straight-forward task.
(( start rant:
and I don't understand why this hasn't been fixed long ago - not like some guy calling himself "Abuser" did make CCP look like a fool in 2008 by publishing decompiled client code, pointing out the security risks of Python injections and asking "Why not to add client-side routines to detect bots?"
Quote:[20:33] <Abuser> Why not to add client-side routines to detect bots? [20:34] <Abuser> Why using petitions? [20:34] <Abuser> People can lie, people can put a bucket of dirt on player who never violated eula [20:35] <Abuser> And he will be banned, if petition will contain only right details describing the things you will never log, but that are surely be bot\'s actions [20:36] <Abuser> EVE Clientside is enough to put bot-detecting routines there [20:36] <Abuser> you can even use [20:36] <Abuser> your spyware approach [20:36] <Abuser> similar to when downloading PC identification python object during authentication as payload [20:37] <[IA]Morpheus> Let it all out, I\'ll be sure to forward the conversation to all of our programmers, if thats what you want. [20:37] <Abuser> No, your programmers are just following the plan [20:37] <Abuser> they aren\'t that bad guys who caused all this anarchy [20:37] <[IA]Morpheus> Care to tell me who did? [20:38] <Abuser> Those who plan eve development and/or who decide the priority of client upgrades to be implemented. [20:39] <Abuser> Currently Shiny Features have more priority than solidifying security and fixing bugs, from what i see [20:40] <Abuser> Or how else you can explain the ability for the bots to use same approach to exploit eve engine as when previous sourcecode leak was? [20:41] <Abuser> Nothing changed to prevent this? [20:41] <Abuser> But we\'ve got tons of content patched [20:41] <Abuser> but still lagging jita and deadly lagging blobs [20:41] <Abuser> but from patchnotes i see that these things aren\'t your priority [20:42] <[IA]Morpheus> I see that your intentions are good but this isn\'t playing out nicely for either parts. [20:43] <Abuser> Guys, theres no other way that will play better. [20:43] <Abuser> You simply ignore community requests to fix the core of eve, rather than add new coats to it, to make community forget about the bugs. [20:43] <[IA]Morpheus> I despise bots and hacks over everything, but this is also a business, we\'ve got developers designing content and EVE needs to grow. I know for a fact that there are programmers working on security, more than that I can\'t really say. [20:43] <[IA]Morpheus> If you think we are releasing new content to make you forget about bugs then I\'m not sure what I can say to convince you.
yes, Ladies & Gentlemen, that was April 2008 - almost to the day 3 years ago.
edit: according to CCP's favorite persona non grata the "previous sourcecode leak" took place in 2006 and was accompanied by the release of a Python-injection based mining bot. I am too lazy to verify this as almost all Google results seem to reference the 2008 leak.
))
Mining bots & ratting bots will always create some customer outcry because they operate in plain sight and compete with human players over scarce resources - but for the same reasons they are easy to detect and it is relatively easy for players to take action against them.
Mission running bots compete in a much less obvious manner with human players (overall inflation, ISK/LP ratio, prices of meta 1-4 modules) and their interaction with other players is usually limited to bumping into each other at the station undock (+ the occasional ninja salvager).
One system can only support so many mining or ratting bots - but one agent can support any number of mission running bots (and I don't believe dynamic agent quality will ever be implemented in a fashion that is harsh enough to change this qualitatively).
Hooking into the EVE client process allows for extremely sophisticated bots, is currently used for the most dangerous bots (imo) and is relatively hard to prevent without really invasive anti-botting tools (don't know about the EVE specifics but I have a rough idea how malware usually achieves its goal of hooking into system processes) - yet it is the one thing your reply doesn't even mention at all.
(disclaimer: I don't know InnerSpace well enough to be 100% certain that it doesn't use Python injection internally but I don't see any reason why it should have to)
CCP Sreegs wrote:We will not, however, be documenting specific controls. we'll read about the specifics a few weeks later on the forums frequented by bot authors, anyways. |

Malcanis
Alcohlics Anonymous
7
|
Posted - 2011.04.07 20:44:00 -
[102] - Quote
CCP Sreegs wrote:BeanBagKing wrote:CCP Sreegs wrote:I can also say that having haulers killed in a system isn't necessarily an indicator of bot-related activity. * Haulers getting killed no, but I've seen the types of systems he's talking about. Non stop haulers, back and forth from a mission hub, fail fit with nothing but mission items. And I mean non stop, if you kill the ship, they continue on in a pod, they just keep coming and going, knowing (well, if there was a person there they would know) that there is a gate camp -right there-. Go to the systems and watch them, get a player or two to sit there and kill them and just watch them keep going. You don't need metrics or complicated software to see that there's nobody behind the controls. That's why players are frustrated after all this time. I do feel like you guys are finally picking up the ball on botting, and as I understand it, you haven't been in charge of this specific area for long, but previous statements by CCP, and then what players construe as a clear lack of action has left you in a tight spot. People don't and won't trust you unless they see results and clear action. Do us a favor though, you say that it may take some time for massive results to become evident. Show us these. In a month or two come back and point to that system and say "see? We found the program that was running courier bots and close that one", show us the figures on how many bots have been banned, how many programs aren't working. PLEASE show me that and tell us all how wrong we were! I know you can't give details and specifics, but until the players see this, we will continue to be skeptical. *Full quote https://forums.eveonline...osts&m=8839#post8839 I know I'm in kind of a tough spot and I understand your frustration. Our plan is to be as open with you guys as we can be and we've got a lot of good ideas circulating around the team about how to do that. One other thing we need to be careful about is prematurely trumpeting success. There's at least one bot site you could look at right now that isn't selling its bot or allowing it for download. Why? It's not because they've suddenly decided to be good citizens it's because we were banning them. It's ultimately a game of cat and mouse however and we'll need a few more weeks to research, action and examine before we're ready to start tooting horns. You'll be the first to know about it when we are though.
How do you feel about the tactics used by that guy (can't recall the name) in the previous thread, viz doing a few basic checks to see whether they're complying with the laws in their local jurisdiction with respect to business registration, taxes and so forth.
Setting the local tax authorities on the bot sellers would be an extremely effective way of interdicting or restricting their operations, with the additional benefit of providing much satisfaction to those of your customers who do pay their taxes and wish that everyone else shared the joy of the experience with them. Assuming that CCP Hf is itself all up to date in this respect, it seems like there would be no down side to ******* with these guys in this way.
EDIT: Time spent arguing with the inland revenue and the customs and excise people (dunno what they're like in the US and Iceland, but in the UK, the Customs guys can be really mean. Can you say "no presumption of innocence"?) is time not spent updating their bot code. |

dexington
Baconoration
21
|
Posted - 2011.04.07 20:57:00 -
[103] - Quote
Florestan Bronstein wrote:CCP Sreegs wrote:We are aware of OCR bots and have plans to deal with them. Python injection as well. Maybe I am reading too much into that reply but of the three most important bot categories you list only two. What about plain process injection/hooking (whether this is done via InnerSpace or otherwise)?
You know of python bots that don't use process injection?, i did'nt think it was possible to make any kind of python injection without using process injection. |
|

CCP Sreegs
C C P C C P Alliance
90

|
Posted - 2011.04.07 21:12:00 -
[104] - Quote
Florestan Bronstein wrote:Maybe I am reading too much into that reply but of the three most important bot categories you list only two. What about plain process injection/hooking (whether this is done via InnerSpace or otherwise)? Both (combat) mission bots I am currently aware of hook into the EVE client via InnerSpace - and if I were concerned about the health of the game that's the group of bots I would be most worried about. Missions running bots would be pretty painful to construct based on an OCR system & hardening the EVE client against Python injections looks like a relatively straight-forward task. (( start rant: and I don't understand why this hasn't been fixed long ago - not like some guy calling himself "Abuser" did make CCP look like a fool in 2008 by publishing decompiled client code, pointing out the security risks of Python injections and asking "Why not to add client-side routines to detect bots?" Quote:[20:33] <Abuser> Why not to add client-side routines to detect bots? [20:34] <Abuser> Why using petitions? [20:34] <Abuser> People can lie, people can put a bucket of dirt on player who never violated eula [20:35] <Abuser> And he will be banned, if petition will contain only right details describing the things you will never log, but that are surely be bot\'s actions [20:36] <Abuser> EVE Clientside is enough to put bot-detecting routines there [20:36] <Abuser> you can even use [20:36] <Abuser> your spyware approach [20:36] <Abuser> similar to when downloading PC identification python object during authentication as payload [20:37] <[IA]Morpheus> Let it all out, I\'ll be sure to forward the conversation to all of our programmers, if thats what you want. [20:37] <Abuser> No, your programmers are just following the plan [20:37] <Abuser> they aren\'t that bad guys who caused all this anarchy [20:37] <[IA]Morpheus> Care to tell me who did? [20:38] <Abuser> Those who plan eve development and/or who decide the priority of client upgrades to be implemented. [20:39] <Abuser> Currently Shiny Features have more priority than solidifying security and fixing bugs, from what i see [20:40] <Abuser> Or how else you can explain the ability for the bots to use same approach to exploit eve engine as when previous sourcecode leak was? [20:41] <Abuser> Nothing changed to prevent this? [20:41] <Abuser> But we\'ve got tons of content patched [20:41] <Abuser> but still lagging jita and deadly lagging blobs [20:41] <Abuser> but from patchnotes i see that these things aren\'t your priority [20:42] <[IA]Morpheus> I see that your intentions are good but this isn\'t playing out nicely for either parts. [20:43] <Abuser> Guys, theres no other way that will play better. [20:43] <Abuser> You simply ignore community requests to fix the core of eve, rather than add new coats to it, to make community forget about the bugs. [20:43] <[IA]Morpheus> I despise bots and hacks over everything, but this is also a business, we\'ve got developers designing content and EVE needs to grow. I know for a fact that there are programmers working on security, more than that I can\'t really say. [20:43] <[IA]Morpheus> If you think we are releasing new content to make you forget about bugs then I\'m not sure what I can say to convince you. yes, Ladies & Gentlemen, that was April 2008 - almost to the day 3 years ago. edit: according to CCP's favorite persona non grata the "previous sourcecode leak" took place in 2006 and was accompanied by the release of a Python-injection based mining bot. I am too lazy to verify this as almost all Google results seem to reference the 2008 leak. )) Mining bots & ratting bots will always create some customer outcry because they operate in plain sight and compete with human players over scarce resources - but for the same reasons they are easy to detect and it is relatively easy for players to take action against them. Mission running bots compete in a much less obvious manner with human players (overall inflation, ISK/LP ratio, prices of meta 1-4 modules) and their interaction with other players is usually limited to bumping into each other at the station undock (+ the occasional ninja salvager). One system can only support so many mining or ratting bots - but one agent can support any number of mission running bots (and I don't believe dynamic agent quality will ever be implemented in a fashion that is harsh enough to change this qualitatively). Hooking into the EVE client process allows for extremely sophisticated bots, is currently used for the most dangerous bots (imo) and is relatively hard to prevent without really invasive anti-botting tools (don't know about the EVE specifics but I have a rough idea how malware usually achieves its goal of hooking into system processes) - yet it is the one thing your reply doesn't even mention at all. (disclaimer: I don't know InnerSpace well enough to be 100% certain that it doesn't use Python injection internally but I don't see any reason why it should have to) CCP Sreegs wrote:We will not, however, be documenting specific controls. we'll read about the specifics a few weeks later on the forums frequented by bot authors, anyways.
This post is huge but the reason I only mentioned those two is that those were the two that were asked about in the post I was responding to. I believe I said that we have some work to do protecting the client in the Fanfest presentation. From my perspective any conversations about 2008 don't really make much of a difference to me in what we need to do now in 2011. When I said all botting I meant all botting. When I said protecting the client I meant protecting the client. I don't think it does anyone any good to spend all day expounding upon the various methods by which some potential attack could occur. |
|

Florestan Bronstein
Element 115. Test Alliance Please Ignore
21
|
Posted - 2011.04.07 21:15:00 -
[105] - Quote
dexington wrote:You know of python bots that don't use process injection?, i did'nt think it was possible to make any kind of python injection without using process injection. I don't think that's possible either 
But you can fight Python injecting bots without doing anything about other types that use process injection - and DaTeach's suggestions that were quoted in the other thread (which matched very well with the concerns & information found on publicdemands) seemed to be aimed at exactly that (correct me if I am wrong, my knowledge is a little sketchy).
Whereas preventing any code from hooking into your software can be an absolute pain - if the user has the ability to modify system and 3rd party libraries that your program relies upon to serve as vectors for DLL injection you have - as far as I am aware - a pretty big challenge in front of you (especially if your own application is non-privileged).
edit: wrote that reply to protect my e-honour before reading Sreeg's reply. Mods/Sreegs please delete if you want to - I would prefer it to remain in this thread but don't really mind. |
|

CCP Sreegs
C C P C C P Alliance
90

|
Posted - 2011.04.07 21:15:00 -
[106] - Quote
Malcanis wrote:CCP Sreegs wrote:BeanBagKing wrote:CCP Sreegs wrote:I can also say that having haulers killed in a system isn't necessarily an indicator of bot-related activity. * Haulers getting killed no, but I've seen the types of systems he's talking about. Non stop haulers, back and forth from a mission hub, fail fit with nothing but mission items. And I mean non stop, if you kill the ship, they continue on in a pod, they just keep coming and going, knowing (well, if there was a person there they would know) that there is a gate camp -right there-. Go to the systems and watch them, get a player or two to sit there and kill them and just watch them keep going. You don't need metrics or complicated software to see that there's nobody behind the controls. That's why players are frustrated after all this time. I do feel like you guys are finally picking up the ball on botting, and as I understand it, you haven't been in charge of this specific area for long, but previous statements by CCP, and then what players construe as a clear lack of action has left you in a tight spot. People don't and won't trust you unless they see results and clear action. Do us a favor though, you say that it may take some time for massive results to become evident. Show us these. In a month or two come back and point to that system and say "see? We found the program that was running courier bots and close that one", show us the figures on how many bots have been banned, how many programs aren't working. PLEASE show me that and tell us all how wrong we were! I know you can't give details and specifics, but until the players see this, we will continue to be skeptical. *Full quote https://forums.eveonline...osts&m=8839#post8839 I know I'm in kind of a tough spot and I understand your frustration. Our plan is to be as open with you guys as we can be and we've got a lot of good ideas circulating around the team about how to do that. One other thing we need to be careful about is prematurely trumpeting success. There's at least one bot site you could look at right now that isn't selling its bot or allowing it for download. Why? It's not because they've suddenly decided to be good citizens it's because we were banning them. It's ultimately a game of cat and mouse however and we'll need a few more weeks to research, action and examine before we're ready to start tooting horns. You'll be the first to know about it when we are though. How do you feel about the tactics used by that guy (can't recall the name) in the previous thread, viz doing a few basic checks to see whether they're complying with the laws in their local jurisdiction with respect to business registration, taxes and so forth. Setting the local tax authorities on the bot sellers would be an extremely effective way of interdicting or restricting their operations, with the additional benefit of providing much satisfaction to those of your customers who do pay their taxes and wish that everyone else shared the joy of the experience with them. Assuming that CCP Hf is itself all up to date in this respect, it seems like there would be no down side to ******* with these guys in this way. EDIT: Time spent arguing with the inland revenue and the customs and excise people (dunno what they're like in the US and Iceland, but in the UK, the Customs guys can be really mean. Can you say "no presumption of innocence"?) is time not spent updating their bot code.
Everyone explores all options when it comes to shutting down websites that are profiting off of someone else's work, such as RMTers who are selling virtual property that they don't own. This is why so many of those sites are in China. |
|

Dalton Vanadis
Paws on INC.
404
|
Posted - 2011.04.07 21:48:00 -
[107] - Quote
I'd be interested to hear more on the discussion about multi-boxing, especially since it seems there are a few otherwise legitimate uses for programs like synergy, such as a kvm switch.
Otherwise, I have to say, go Sreegs! If nothing else I find it extremely heartening that at this hour CCP staff is actively on and responding to players about issues that concern them. For that level of involvement, just gotta say that's awesome and keep it up! |

Selinate
77
|
Posted - 2011.04.07 21:51:00 -
[108] - Quote
I think this thread wins for most CCP responses, even if it is just Sreegs  |

Crucis Cassiopeiae
PORSCHE AG Terminal Ferocity
387
|
Posted - 2011.04.07 21:52:00 -
[109] - Quote
CCP Sreegs wrote:Crucis Cassiopeiae wrote:@ CCP Sreegs
Can you please update your first post with link to the main botting thread on old forum so that ppl have direct link on history of this problem... Done
Thnx... :) |

Darth Skorpius
m3 Corp Fidelas Constans
3
|
Posted - 2011.04.07 22:02:00 -
[110] - Quote
Grarr Dexx wrote:In all my years as an online person, player of countless online universes and prowler of many large community forums, I can honestly say that I have NEVER been hacked. Now, this might be a one in a billion fluke, but I'm pretty sure that if you get hacked, the reason is you or your vicinity.
i had my account for another mmo "hacked" once, they brute forced my password (my pc wasnt infected and i dont visit dodgy sites anyway) thankfully i was online doing some crafting at the time and was able ot quickly relog while changing my password with a clean system, so they got nothing from me other than a username, which was always the weakest part of my login info anyway. saying that its everyoens own fault when they get hacked is stupid, sometimes it doesnt matter how paranoid you are about online security you are you will get hacked, thats why they call it brute forcing |

dexington
Baconoration
21
|
Posted - 2011.04.07 22:09:00 -
[111] - Quote
Darth Skorpius wrote:i had my account for another mmo "hacked" once, they brute forced my password (my pc wasnt infected and i dont visit dodgy sites anyway) thankfully i was online doing some crafting at the time and was able ot quickly relog while changing my password with a clean system, so they got nothing from me other than a username, which was always the weakest part of my login info anyway. saying that its everyoens own fault when they get hacked is stupid, sometimes it doesnt matter how paranoid you are about online security you are you will get hacked, thats why they call it brute forcing
It was not your fault the your password was so weak they were able to brute force it? |

Juil
Phoenix Industries Pty. Ltd.
0
|
Posted - 2011.04.07 23:08:00 -
[112] - Quote
There are a few ways that you can be 'hacked' from a pure 100% programming/security Point of view.
1. You give your username and password to some one else - This can be through phishing mail or whatever.. but your at fault for not double checking where you where putting your details into. 2. Keyloggers, Trojans, Virus's etc etc - Again where oh where have you been that you shouldn't have been and why oh why ain't your virus software up to date? 3. Brute force attack - Ok this is technically not your fault, sorry those who think it is but it's not.. a brute force attack simply runs through both a dictionary attack followed by random number and random letter attacks.. starting at the lower limit of the number set by the person running the BF attack (typically 4 - 6 characters) and ending at the largest (typically 10 - 12) however these attacks typically become rather obvious and should be noticed by the server side protection software.. I mean if you can't get your password right after the 50th time somethings up right? 4. Security leak at the Opposit end - This means a Leak at CCP's end in this case.. and honestly it's not exacty unheard of with CCP now is it? (Sorry Screegs no offense meant) CCP has had it's bad sheep, we have had Dev's who break rules to help people in game, we have obviously had Dev's who leaked entire source code releases.. and there is always the chance a dev could steal the authentication database.. or that CCP itself could be hacked or whatever.
Now there are a few ways to protect against hacking:
1. Change your password every few weeks/months - This means that your password isn't always the same and can stop those who tend to wait a time to use the data they have mined off you. 2. Make your password more complicated - this means using a mixture of UPPERCASE, lowercase and numeric characters, eg E424b8A7g9 <---- this would be an example of a randomly generated password that is not the easiest to hack, the reason being that it has all 3 of the items listed.. if eve supported non alpha/numeric characters i'd even suggest adding thoses ie #24A43%32nn13 etc. 3. Add an extra layer of authentication to the account:- in the form of a randomly generated number sequence that changes based on time/date etc where the serial number is tied into your account at the server level.. This is better known as an Authenticator and most already know how they work.. not only do you enter your user name and password but you also enter a number generated by the keychain fob or the iphone app etc with out this you can't authenticate. 4. The most basic one.. Keep your damned virus software up to date. Even the free software antivirus packages are good for basic protection AVG, Microsofts programs etc all can pick up most of the common trojans, paid antivirus tends to include a better overall protection package. 5. as with your virus protection keep your OS updated. - You may not realise it but Microsoft and Apple don't release all those 'updates' just to make your bandwidth cry. They are put out to address security issues and other bugs in the software.. with out them you are leaving your system open to attacks.
Now I could go on but lets face it CCP has a long ass list up on all of this.. but it's a reminder that not all 'hacks' are based on the end user.. some are just well.. bad luck. |

Darth Skorpius
m3 Corp Fidelas Constans
3
|
Posted - 2011.04.07 23:11:00 -
[113] - Quote
dexington wrote:Darth Skorpius wrote:i had my account for another mmo "hacked" once, they brute forced my password (my pc wasnt infected and i dont visit dodgy sites anyway) thankfully i was online doing some crafting at the time and was able ot quickly relog while changing my password with a clean system, so they got nothing from me other than a username, which was always the weakest part of my login info anyway. saying that its everyoens own fault when they get hacked is stupid, sometimes it doesnt matter how paranoid you are about online security you are you will get hacked, thats why they call it brute forcing It was not your fault the your password was so weak they were able to brute force it?
it wasnt a weak password. granted it wasnt the strongest password, but it most certianly wasnt weak. sometimes the hackers get lucky and a strong password is compromised. i was one of the lucky ones in that it happened while i was online and was able to prevent any damage from being done. |

NinjaSpud
Masons of New Eden The Laughing Men
10
|
Posted - 2011.04.07 23:14:00 -
[114] - Quote
So, do you guys still want me to continue updating you all on the activities of the bot forums? I'm not gonna lie, it was fun. 
I might have to make my own thread though...up to you, Sreegs.
|

Darth Skorpius
m3 Corp Fidelas Constans
3
|
Posted - 2011.04.07 23:16:00 -
[115] - Quote
NinjaSpud wrote:So, do you guys still want me to continue updating you all on the activities of the bot forums? I'm not gonna lie, it was fun.  I might have to make my own thread though...up to you, Sreegs.
i think you should keep it up.
also, can we get this thread stickied please? i would hate for it to drop off the front page and end up buried |

Buster Gonads
Tiny Industries
19
|
Posted - 2011.04.07 23:17:00 -
[116] - Quote
NinjaSpud wrote:So, do you guys still want me to continue updating you all on the activities of the bot forums? I'm not gonna lie, it was fun.  I might have to make my own thread though...up to you, Sreegs.
Yes, definitely. Keep up the good work. |

Barakkus
370
|
Posted - 2011.04.07 23:18:00 -
[117] - Quote
NinjaSpud wrote:So, do you guys still want me to continue updating you all on the activities of the bot forums? I'm not gonna lie, it was fun.  I might have to make my own thread though...up to you, Sreegs.
You're probably better off emailing them info. There's a [email protected] (that may not be the exact email address) or something like that email you can send the stuff to. That way it doesn't get lost in all the shiptoasting on the forums.
I'm sure the rest of us would like to read your findings though  |

dexington
Baconoration
21
|
Posted - 2011.04.07 23:23:00 -
[118] - Quote
Juil wrote:3. Brute force attack - Ok this is technically not your fault, sorry those who think it is but it's not.. a brute force attack simply runs through both a dictionary attack followed by random number and random letter attacks.. starting at the lower limit of the number set by the person running the BF attack (typically 4 - 6 characters) and ending at the largest (typically 10 - 12) however these attacks typically become rather obvious and should be noticed by the server side protection software.. I mean if you can't get your password right after the 50th time somethings up right?
No one with half a brain would attempt a brute force attack, standard alphanumeric passwords is some 75 possibilities pr character. We are talking well over 100B combinations on even simple 6 character passwords, at 100 tries pr sec it would take over 100 days to try all possibilities.
If someone is trying "brute force" a password over the internet, it's most likely a dictionary attack where they try a list of commonly used password in hopes of exploiting human stupidity. |

Siiee
Recycled Heroes
3
|
Posted - 2011.04.07 23:27:00 -
[119] - Quote
NinjaSpud wrote:So, do you guys still want me to continue updating you all on the activities of the bot forums? I'm not gonna lie, it was fun. 
Absolutely, it's an excellent source of record, and very entertaining to read  |

Vincent Athena
V.I.C.E.
16
|
Posted - 2011.04.07 23:34:00 -
[120] - Quote
NinjaSpud wrote:So, do you guys still want me to continue updating you all on the activities of the bot forums? I'm not gonna lie, it was fun.  I might have to make my own thread though...up to you, Sreegs.
CCP Sreegs referenced your thread at the top of this new one, so I think that means you are invited to post bot war reports here. Im posting my market survey info here (looking for effects on the market from bot bans).
Edit: Also, Sreegs is referencing the bots by name, so I do not think you need to hide them, unless you want to. CCP Sreegs: Maybe this thread needs:
Links to all the security related dev blogs added to your initial post (the original unholy rage, your phishing blog, the protect your accounts blog, etc) To be made sticky. |
| |
|
| Pages: 1 2 3 [4] 5 6 :: one page |
| First page | Previous page | Next page | Last page |