This is one view of a huge EVE Online battle. I have no idea what's going on.
Two stories for this post that address something we'll be talking about later in the semester; virtual goods that have cost real time and real money, and the very timely topic of security.
The first story involves online game EVE Online that takes place in a vast universe. In this game, players build and pilot ships, mine for materials, form and join alliances and corporations, and engage in space battles. The catch is, everything happens in real time. If something says it will take "3 days" to complete, it will take three actual days. Some things take much longer, up to months. And in a curious twist, in game currency, known as ISK, can be used for
real-world items.
Recently, a
huge battle erupted in this online universe, over an unpaid in-game bill no less, that is estimated to have cost the equivalent of $500,000 (UPDATE:
$570,000). As the article states, one of the consequences of this battle was the destruction of what are known as Titan ships, worth about $3,000 dollars each in terms of time investment, and take real-world months to build. The currency in EVE Online, as is the case with
other virtual worlds, has a real-world exchange rate, although much of it is calculated through time invested. Second Life, referenced in the above link, has a virtual economy linked much more closely with the real world. Even so, players take their ISK seriously, with a huge scandal erupting when a
200 billion-ISK heist happened back in 2008.
I am only familiar with EVE Online through third party sources, so if anyone knows more about it be sure to fill us in in the comments!
That sets us up for the next story which is much more serious, and has implications that are much more far-reaching than even outer space, virtual as it may be.
In this case, Twitter user Naoki Hiroshima, whose Twitter handle was the very in-demand '@N,' was subjected to a
social-engineering attack. He had been offered as much as $50,000 for that handle in the past, and attempts to steal it have been tried before as well. However when hackers used the very non-technical social-engineering approach, they
finally got through. Convincing PayPal to release the last four digits of his credit card number to them, they then used that to take over all his web sites at GoDaddy and held them hostage. In order to get those domains back, he ended up handing over the details for his @N Twitter account.
A full account of the attack, it's resolution, along with an unparalleled and mesmerizing conversation with his attackers, can be found
at this link. It's a fascinating, educational, and scary read.
UPDATE:
Hmmmm.