this post was submitted on 02 Jan 2024
398 points (99.0% liked)

Cybersecurity - Memes

2034 readers
118 users here now

Only the hottest memes in Cybersecurity

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] A_A 60 points 1 year ago (2 children)

Plot twist : code is 8253, ... and prints are false flags :o)

[–] RedditWanderer 71 points 1 year ago (3 children)

This works.

In Eve Online there was this big war, and a big ship was being built in some station. So everyone gathered around the station to protect it, and of course the enemy came after it. A huge battle ensued and in the end the station was destroyed successfully.

Except the ship wasn't in that station, it was being built at another station, the defenders just mislead them by protecting a random empty station. The ship finished its construction later that month.

[–] PP_BOY_ 32 points 1 year ago (3 children)

Shit like this makes me wish I had a headstart on PC gaming. That stuff sounds so fun to take part in

[–] [email protected] 20 points 1 year ago

Go run doen the eve online stories. People have gone under cover in enemy groups for years, just to rise in the ranks until they can just plunder the whole org for the equivalent of tens, even hundreds of thousands of dollars.

I think there was even a guild in the game the specialized on long con espionage called like "the crimson rose" or some such.

The game itself is basically excel, but the "player generated" environment is an epic story generator.

[–] [email protected] 8 points 1 year ago

I mean, EVE hasn't gone anywhere, it still has a large and active playerbase, there's nothing stopping you from joining now.

[–] [email protected] 2 points 1 year ago

There could be another eve like mmo, who knows

[–] Land_Strider 6 points 1 year ago (1 children)

Huh, which battle is that? It isn't the BR-5RB battle that keeps giving more story tidbits still over all those years, is it?

[–] RedditWanderer 6 points 1 year ago (1 children)

It was during that war yeah. That system was just what initiated it all.

[–] Land_Strider 1 points 1 year ago

Ah, thanks. Cool to still hear more stuff about it.

[–] puppy 1 points 10 months ago

I believe this technique is called a "honeypot" in cyper security. Im addition, the honeypot would also gather as much info as possible about the visitors i.e. any potential hacker.

[–] SkyezOpen 11 points 1 year ago

Nah, you definitely have to use one or two of the worn ones just so it's impossible to narrow down which ones.