395
Hmm (lemmy.world)
you are viewing a single comment's thread
view the rest of the comments
[-] A_A@lemmy.world 59 points 1 year ago

Plot twist : code is 8253, ... and prints are false flags :o)

[-] RedditWanderer@lemmy.world 70 points 1 year ago

This works.

In Eve Online there was this big war, and a big ship was being built in some station. So everyone gathered around the station to protect it, and of course the enemy came after it. A huge battle ensued and in the end the station was destroyed successfully.

Except the ship wasn't in that station, it was being built at another station, the defenders just mislead them by protecting a random empty station. The ship finished its construction later that month.

[-] PP_BOY_@lemmy.world 32 points 1 year ago

Shit like this makes me wish I had a headstart on PC gaming. That stuff sounds so fun to take part in

[-] mosiacmango@lemm.ee 20 points 1 year ago

Go run doen the eve online stories. People have gone under cover in enemy groups for years, just to rise in the ranks until they can just plunder the whole org for the equivalent of tens, even hundreds of thousands of dollars.

I think there was even a guild in the game the specialized on long con espionage called like "the crimson rose" or some such.

The game itself is basically excel, but the "player generated" environment is an epic story generator.

[-] HenryWong327@lemmy.ml 8 points 1 year ago

I mean, EVE hasn't gone anywhere, it still has a large and active playerbase, there's nothing stopping you from joining now.

[-] deur@feddit.nl 2 points 1 year ago

There could be another eve like mmo, who knows

[-] Land_Strider@lemmy.world 6 points 1 year ago

Huh, which battle is that? It isn't the BR-5RB battle that keeps giving more story tidbits still over all those years, is it?

[-] RedditWanderer@lemmy.world 6 points 1 year ago

It was during that war yeah. That system was just what initiated it all.

[-] Land_Strider@lemmy.world 1 points 1 year ago

Ah, thanks. Cool to still hear more stuff about it.

[-] puppy@lemmy.world 1 points 11 months ago

I believe this technique is called a "honeypot" in cyper security. Im addition, the honeypot would also gather as much info as possible about the visitors i.e. any potential hacker.

[-] SkyezOpen@lemmy.world 11 points 1 year ago

Nah, you definitely have to use one or two of the worn ones just so it's impossible to narrow down which ones.

this post was submitted on 02 Jan 2024
395 points (99.0% liked)

Cybersecurity - Memes

1893 readers
172 users here now

Only the hottest memes in Cybersecurity

founded 2 years ago
MODERATORS