Well as all of you may or not know, there has been a huge stir up over on teamfortress.tv about ESEA. I really don't feel like typing everything, so here's basically what happened:
After hearing how ESEA has been using their anticheat client to farm bitcoins and harm your machine, many have decided to quit ESEA after the current season. Their discussions can be found here:
http://teamfortress.tv/forum/thread/14025-the-esea-abuse-thread
There has also been recent discussions/suggestions for ETF2L, a popular European TF2 Competition, to create a 6v6 league here in North America. This can be found here:
http://teamfortress.tv/forum/thread/14024-etf2l-north-american-division
So, what's your thoughts/opinions on this? ESEA has been around for such a long time, but now has it really come to this?
- On or about April 3, 2013, ESEA, through its employees, further created code to
monitor the programs that ESEA end-users ran on their computers, even when those end-userswere not using ESEA services and the ESEA Software was not turned on ("ESEA Monitoring
Code").
- To play on ESEA hosted game servers, end-users must download and install
ESEA Software onto their computers. Once installed, the ESEA Software enables ESEA full
administrative access of end-users' computers.
- At least defendants Hunczak and Thunberg had fuIl administrative access to all
end-users' computers. The ESEA Software enabled Defendants to not only monitor end-user
computer activity but also view and upload any and all end-users' computer files.
- The ESEA Monitoring Code monitored computer activity even
when end-users were not using ESEA services and the ESEA Software was not turned on. ESEA
concealed the ESEA Monitoring Code in the ESEA Software driver on end-users' computers.
ESEA also programed the ESEA Software to reload the ESEA Monitoring Code even if end-users attempted to "unload" the driver.
- Prior to implementation, Thunberg approved the ESEA Monitoring Code and
allowed the ESEA Monitoring Code to be place on end-users' computers via the ESEA
Software.
- In at least several instances, ESEA employees used the ESEA Software to copy
files from ESEA end-users' computers.
- Once executed and running on end-users' computers, the ESEA Bitcoin Mining
Code was set to mine for bitcoins only when end-users' were away from their computer. Among
other methods, the code detected whether end-users were active on their computers by
monitoring end-users' mouse movements and/or mouse location.
- Defendant Hunczak created at least four bitcoin wallet addresSes where he
deposited bitcoiàs mined from the ESEA Botnet.
- Defendant Hunczak then sold the bitcoins from the ESEA Botnet, converting the
bitcoins into U.S. dollars. The proceeds were then deposited into Hunczak's personal bank
account.
http://nj.gov/oag/newsreleases13/E-Sports_Complaint_Consent-Judgment.pdf
Eric "lpkane" Thunberg
Sean "jaguar" Hunczak
Craig "Torbull" Levine
All we wanted was to reschedule a match..
monitor the programs that ESEA end-users ran on their computers, even when those end-userswere not using ESEA services and the ESEA Software was not turned on ("ESEA Monitoring
Code").
- To play on ESEA hosted game servers, end-users must download and install
ESEA Software onto their computers. Once installed, the ESEA Software enables ESEA full
administrative access of end-users' computers.
- At least defendants Hunczak and Thunberg had fuIl administrative access to all
end-users' computers. The ESEA Software enabled Defendants to not only monitor end-user
computer activity but also view and upload any and all end-users' computer files.
- The ESEA Monitoring Code monitored computer activity even
when end-users were not using ESEA services and the ESEA Software was not turned on. ESEA
concealed the ESEA Monitoring Code in the ESEA Software driver on end-users' computers.
ESEA also programed the ESEA Software to reload the ESEA Monitoring Code even if end-users attempted to "unload" the driver.
- Prior to implementation, Thunberg approved the ESEA Monitoring Code and
allowed the ESEA Monitoring Code to be place on end-users' computers via the ESEA
Software.
- In at least several instances, ESEA employees used the ESEA Software to copy
files from ESEA end-users' computers.
- Once executed and running on end-users' computers, the ESEA Bitcoin Mining
Code was set to mine for bitcoins only when end-users' were away from their computer. Among
other methods, the code detected whether end-users were active on their computers by
monitoring end-users' mouse movements and/or mouse location.
- Defendant Hunczak created at least four bitcoin wallet addresSes where he
deposited bitcoiàs mined from the ESEA Botnet.
- Defendant Hunczak then sold the bitcoins from the ESEA Botnet, converting the
bitcoins into U.S. dollars. The proceeds were then deposited into Hunczak's personal bank
account.
http://nj.gov/oag/newsreleases13/E-Sports_Complaint_Consent-Judgment.pdf
Eric "lpkane" Thunberg
Sean "jaguar" Hunczak
Craig "Torbull" Levine
All we wanted was to reschedule a match..
After hearing how ESEA has been using their anticheat client to farm bitcoins and harm your machine, many have decided to quit ESEA after the current season. Their discussions can be found here:
http://teamfortress.tv/forum/thread/14025-the-esea-abuse-thread
There has also been recent discussions/suggestions for ETF2L, a popular European TF2 Competition, to create a 6v6 league here in North America. This can be found here:
http://teamfortress.tv/forum/thread/14024-etf2l-north-american-division
So, what's your thoughts/opinions on this? ESEA has been around for such a long time, but now has it really come to this?