• @A_A
    link
    589 months ago

    Plot twist : code is 8253, … and prints are false flags :o)

    • @RedditWanderer
      link
      689 months ago

      This works.

      In Eve Online there was this big war, and a big ship was being built in some station. So everyone gathered around the station to protect it, and of course the enemy came after it. A huge battle ensued and in the end the station was destroyed successfully.

      Except the ship wasn’t in that station, it was being built at another station, the defenders just mislead them by protecting a random empty station. The ship finished its construction later that month.

      • mommykink
        link
        319 months ago

        Shit like this makes me wish I had a headstart on PC gaming. That stuff sounds so fun to take part in

        • @[email protected]
          link
          fedilink
          199 months ago

          Go run doen the eve online stories. People have gone under cover in enemy groups for years, just to rise in the ranks until they can just plunder the whole org for the equivalent of tens, even hundreds of thousands of dollars.

          I think there was even a guild in the game the specialized on long con espionage called like “the crimson rose” or some such.

          The game itself is basically excel, but the “player generated” environment is an epic story generator.

        • @[email protected]
          link
          fedilink
          89 months ago

          I mean, EVE hasn’t gone anywhere, it still has a large and active playerbase, there’s nothing stopping you from joining now.

      • @Land_Strider
        link
        69 months ago

        Huh, which battle is that? It isn’t the BR-5RB battle that keeps giving more story tidbits still over all those years, is it?

        • @RedditWanderer
          link
          69 months ago

          It was during that war yeah. That system was just what initiated it all.

          • @Land_Strider
            link
            19 months ago

            Ah, thanks. Cool to still hear more stuff about it.

      • @puppy
        link
        18 months ago

        I believe this technique is called a “honeypot” in cyper security. Im addition, the honeypot would also gather as much info as possible about the visitors i.e. any potential hacker.

    • @SkyezOpen
      link
      119 months ago

      Nah, you definitely have to use one or two of the worn ones just so it’s impossible to narrow down which ones.