Dev Blog: Security: Different times - Different ways

That is not how strong password work these days. Strong passwords are most importantly one thing: long. Rather use a long password that you can remember easily than a medium or short password that fulfills the above conditions but you have a lot of trouble with remembering.

Weve spent enough time teaching users passwords that are hard to remember and easy to crack for a machine, rather than passwords that are easy to remember and hard to crack for a machine.

This XKCD-comic sums it up pretty nicely: xkcd: Password Strength

4 Likes

I usually recommend that people use “pass sentences”, something like:

“I’m going to get 6 red balloons at the carnival on the 2nd!”

Long, memorable, upper and lower case letters, numbers, and non-alpha numeric characters.

I totally agree with you about choosing something you can remember- security isn’t any good if it’s so user-hostile that you can’t remember it.

Or make your password like this:

Yesh, thatsa smol kovfefe, dont ya toucha my kovfefe

2 Likes

The only best solution to this is utilizing 2-step verification. I can use a password as simple as 12345 (though I wouldn’t recommend it as I’m just joking here) and it still won’t be enough if the hacker doesn’t have my cell phone or email access. Even my emails and bank account are as guarded as Fort Knox with complex passwords and 2-step verifications.

Is it me being paranoid? Yes.
Is it working? Well, none of my accounts have been hacked into for years so I guess the answer is yes.

2FA will help vs account hijacking.

But it does nothing vs botting.

The more secure the accounts are, the less work the security team has to do to deal with hacked accounts and they can then put more time into combatting botting.

1 Like

Its conjecture on my part, but I believe a significant part of reports of hijacked accounts, are infact account-sharers, botters etc trying to convince CCP they were haxxored, when infact they wheren’t.

Its possible that various service provider hacks, like Yahoo debacle, have revealed account login/password to RMT/botters etc, but for anyone even remotely familiar with how difficult that data is to obtain from the hackers (including identifying/contacting/paying them for the data past law-enforcement), or parsing it for details specific to an EVE player, I think it unlikely.


Ill engage 2FA today, so as to put my money where my mouth is.


You are thinking this too narrow. They don’t hack emails to get Eve-accounts. They hack them to get ANY game-accounts.

No, they hack them to get as much data as possible, across all internet related data.

Hacking an email account is more difficult than hacking an EVE account.
Finding an EVE related account among the thousands/millions of hacked email accounts is even more difficult.
Getting access to the hacked email data is even more difficult, involving finding/contacting and purchasing that data from the hackers, past law-enforcement.

You REALLY need to do some research about this. People sell the login-informations to accounts ( email,games, hell, even bank details) IN BULK. You can buy 10-500 000 accounts at once. Some work, others don’t. They do this because they can usually profit from them one way or another.

The rational behind the concept, is that Botters do not have the opportunity to recycle the accounts value to another character.

There is little that could be additionally done with isk and ships, but now that skill points are a major part of the characters value, preventing that being transferred would be a very reasonable and valuable step. this would need to be account wide and permanent as a penalty to be effective though.

An additional option, to prevent it being overwhelming for a “foolish one off mistake leading to a three day ban” there could be the opportunity available for a 12months cool down but with a permanent lock remaining from extracting as an Alpha. But that option could be at GM discretion to enable as a rare opportunity, in the case of borderline decisions. The default publicised decision should always be permalock.

The goal is to make botting have a significant and permanent cost. “for the encouragement of les autres”. It will also be reassuring to the community and reinforce a sense of fairness in the whole system.

I already have researched it.
Its included in my summation above.

Unfortunately, since they reduced the first warning penalty to 3 days, that penalizes a botting operation only by 10% of a sub/PLEX, after which they can use the remainder to transfer assets/SP/characters to another account, and starting the bot hunt on CCPs part all over again.

Atleast with the previous 30 suspension, each account, and all characters on it, suffered the loss of a full sub/PLEX, and an entire month of loss of access to accounts to perform asset/character/SP transfers, and revenue for the remaining 27-24 days from operating accounts.

1 Like

Then you really haven’t. There is a whole economy build on stolen account-details for different uses. People sell and trade them to those who want specific kind of accounts, in this case, MMO-game accounts. Those accounts are then emptied of anything valuable and those items and in-game currencies are then sold to other players on the illegal RMT-websites.

If you truly believe that this doesn’t happen, then you really need to go back and do more research.

Your idea that it’s too impropable to happen is just not the reality anymore. It does happen, all the damn time. It doesn’t just affect Eve, it affects all MMO’s. There are some estimates that the illegal RMT-market globally makes just as much money as the games themselves.

Nowhere have I said I believe it doesnt happen.
Show me where.

Practically every post you’ve done in this thread. You think it’s much more likely that the vast majority of account-breaches that CCP has to deal with is due to “it wasn’t me, someone hacked my account” -defence instead of it actually being hacked.

Show me where I have claimed I dont believe EVE account hacking has happened.

Late to this party but I wanted to thank you guys for doing something visible about the issue. Perception matters a great deal for your customers.

I spent a month killing bots with help from many members of the community. We identified well over a hundred bots in our little area of space and I reported them to security as you said to do.

Would it be at all possible to get at least an automated reply when sending these reports in? TBH, I don’t even know if anyone even got my emails at HQ.

Thanks and keep finding ways to hamper those bots. The community here could help. A little antimatter goes a long way :rofl:

Now about my security tags…
lol

Nice of the commenting interface to let us know when somebody in the thread has already posted the exact same link, because I was just about to post this as well.

This XKCD needs to be posted everywhere, because we are doing a really terrible job at creating secure passwords. The “some 6-10 character string of upper/lowercase, numbers, and special symbols” password protocol was developed by one computer technician in the 1980s; it isn’t what we should be using anymore.

1 Like

Hm, a botting heatmap is an interesting meta.

1 Like