Sigh. You should read between the lines. Tryin got breached, but they probably dont even know what the issue is. And this is another negative focus. Just read up on the ArcheAge forum. Tryin has crap security.
So what should you do? Be honest and communicate or lie and try to cover up that fact and spout some BS you are bringing new security features (which are basically a fix to avoid another accurance).
Well, if you know the manual Scapes is using, you know it's going to be the latter. I'm suprised he didnt remove or close down this thread already. He shouldve said players are stupid and it's their fault.
If you want to know how bad Tryin's security is, just google "2011 Trion servers hacked" or what is going on now. Since there are more people who are compromised in ArcheAge, just read how bad it is:
http://forums.archeagegame.com/showt...d-Transactions
http://forums.archeagegame.com/showt...ized-Purchased.
Either way, Tryin is going to put some IP protection on ArcheAge, there will be extra resources put in security to avoid a (third!) time of these breaches of security happening again and are dealing with it.
Because even if they lie about it, they will have to deal with it. Tryin communication at its best.
Got an email from glyph today informing me of the new procedures re login in from different computers etc.
Glad they're taking my security seriously.
After months of ArcheAge and Defiance users having amounts deducted from their bank accounts they post a non-stickied news topic that it "might be an idea to update your passwords"?
And give us the runaround that this issue has been resolved in a matter of hours? It's insulting. Trion servers got hacked back in 2011. I removed my billing information permanently.
Aside from the shtako communication, this isn't about account information on your toon so they can steal some virtual gear or scrip. People got charged for hundreds of dollars.
I have no confidence (and it wasn't really high to begin with) that Tryin can properly secure my account details, so I removed mine. It's an easy solution to be 100% sure.
Even if it was Glyph that was the issue, I still see things like "bruteforce attacks" and the Paypal is direct payment without any secondary password verification.