• RedditWanderer@lemmy.world
      link
      fedilink
      arrow-up
      72
      arrow-down
      1
      ·
      1 year ago

      This works.

      In Eve Online there was this big war, and a big ship was being built in some station. So everyone gathered around the station to protect it, and of course the enemy came after it. A huge battle ensued and in the end the station was destroyed successfully.

      Except the ship wasn’t in that station, it was being built at another station, the defenders just mislead them by protecting a random empty station. The ship finished its construction later that month.

      • mommykink@lemmy.world
        link
        fedilink
        arrow-up
        32
        ·
        1 year ago

        Shit like this makes me wish I had a headstart on PC gaming. That stuff sounds so fun to take part in

        • mosiacmango@lemm.ee
          link
          fedilink
          arrow-up
          20
          ·
          1 year ago

          Go run doen the eve online stories. People have gone under cover in enemy groups for years, just to rise in the ranks until they can just plunder the whole org for the equivalent of tens, even hundreds of thousands of dollars.

          I think there was even a guild in the game the specialized on long con espionage called like “the crimson rose” or some such.

          The game itself is basically excel, but the “player generated” environment is an epic story generator.

        • HenryWong327@lemmy.ml
          link
          fedilink
          arrow-up
          8
          ·
          1 year ago

          I mean, EVE hasn’t gone anywhere, it still has a large and active playerbase, there’s nothing stopping you from joining now.

      • Land_Strider@lemmy.world
        link
        fedilink
        arrow-up
        6
        ·
        1 year ago

        Huh, which battle is that? It isn’t the BR-5RB battle that keeps giving more story tidbits still over all those years, is it?

      • puppy@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        11 months ago

        I believe this technique is called a “honeypot” in cyper security. Im addition, the honeypot would also gather as much info as possible about the visitors i.e. any potential hacker.

    • SkyezOpen@lemmy.world
      link
      fedilink
      arrow-up
      10
      ·
      1 year ago

      Nah, you definitely have to use one or two of the worn ones just so it’s impossible to narrow down which ones.