POS Exploit, CSM meeting notes

The CSM meeting notes are up at http://myeve.eve-online.com/ingameboard.asp?a=topic&threadID=948936.

I have read the minutes and as you can all guess, the EVE forums are already filling with the “total whitewash” and “nothing new, coverup” posts.  Honestly, there is really nothing new here save the re-afirmation that CCP is still looking into the issue.  CCP does admit that they have some issues, that to identify some of the older data, it will take time.  To think that they could review everything in less than a week is absurd.  This issue will not be resolved quickly, it will take at least a few weeks.  I would expect that we will not really have anything truly useful until the end of January.

As for the veracity of the claims of the abuse going on for 4 years, I had this thought.  Remember the changes to ghost training?  CCP admitted that it had been going on for a long time, but one of the reasons for the change was the sudden increase in abusing the exploit.  I truly believe that is the case here.  The POS exploit existed for a long time and there was an increase in activity according to the CSM notes.  So, they took action when it became widespread and truly noticeable.  As to exactly when this exploit came into existence, well, without a complete review of all data it will take some time.

Until then, I urge everyone to, as my CEO says, “Calm your passions.”  We will learn all that we need to learn about this exploit and exactly how far reaching the abuse truly reached.

Advertisements

~ by J. Riley Castine on December 15, 2008.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

 
%d bloggers like this: