- On or about April 3, 2013, ESEA, through its employees, further created code to
monitor the programs that ESEA end-users ran on their computers, even when those end-userswere not using ESEA services and the ESEA Software was not turned on ("ESEA Monitoring
Code").
- To play on ESEA hosted game servers, end-users must download and install
ESEA Software onto their computers. Once installed, the ESEA Software enables ESEA full
administrative access of end-users' computers.
- At least defendants Hunczak and Thunberg had fuIl administrative access to all
end-users' computers. The ESEA Software enabled Defendants to not only monitor end-user
computer activity but also view and upload any and all end-users' computer files.
- The ESEA Monitoring Code monitored computer activity even
when end-users were not using ESEA services and the ESEA Software was not turned on. ESEA
concealed the ESEA Monitoring Code in the ESEA Software driver on end-users' computers.
ESEA also programed the ESEA Software to reload the ESEA Monitoring Code even if end-users attempted to "unload" the driver.
- Prior to implementation, Thunberg approved the ESEA Monitoring Code and
allowed the ESEA Monitoring Code to be place on end-users' computers via the ESEA
Software.
- In at least several instances, ESEA employees used the ESEA Software to copy
files from ESEA end-users' computers.
- Once executed and running on end-users' computers, the ESEA Bitcoin Mining
Code was set to mine for bitcoins only when end-users' were away from their computer. Among
other methods, the code detected whether end-users were active on their computers by
monitoring end-users' mouse movements and/or mouse location.
- Defendant Hunczak created at least four bitcoin wallet addresSes where he
deposited bitcoiàs mined from the ESEA Botnet.
- Defendant Hunczak then sold the bitcoins from the ESEA Botnet, converting the
bitcoins into U.S. dollars. The proceeds were then deposited into Hunczak's personal bank
account.
http://nj.gov/oag/newsreleases13/E-Sports_Complaint_Consent-Judgment.pdf
Eric "lpkane" Thunberg
Sean "jaguar" Hunczak
Craig "Torbull" Levine
All we wanted was to reschedule a match..
- On or about April 3, 2013, ESEA, through its employees, further created code to
monitor the programs that ESEA end-users ran on their computers, even when those end-userswere not using ESEA services and the ESEA Software was not turned on ("ESEA Monitoring
Code").
- To play on ESEA hosted game servers, end-users must download and install
ESEA Software onto their computers. Once installed, the ESEA Software enables ESEA full
administrative access of end-users' computers.
- At least defendants Hunczak and Thunberg had fuIl administrative access to all
end-users' computers. The ESEA Software enabled Defendants to not only monitor end-user
computer activity but also view and upload any and all end-users' computer files.
- The ESEA Monitoring Code monitored computer activity even
when end-users were not using ESEA services and the ESEA Software was not turned on. ESEA
concealed the ESEA Monitoring Code in the ESEA Software driver on end-users' computers.
ESEA also programed the ESEA Software to reload the ESEA Monitoring Code even if end-users attempted to "unload" the driver.
- Prior to implementation, Thunberg approved the ESEA Monitoring Code and
allowed the ESEA Monitoring Code to be place on end-users' computers via the ESEA
Software.
- In at least several instances, ESEA employees used the ESEA Software to copy
files from ESEA end-users' computers.
- Once executed and running on end-users' computers, the ESEA Bitcoin Mining
Code was set to mine for bitcoins only when end-users' were away from their computer. Among
other methods, the code detected whether end-users were active on their computers by
monitoring end-users' mouse movements and/or mouse location.
- Defendant Hunczak created at least four bitcoin wallet addresSes where he
deposited bitcoiàs mined from the ESEA Botnet.
- Defendant Hunczak then sold the bitcoins from the ESEA Botnet, converting the
bitcoins into U.S. dollars. The proceeds were then deposited into Hunczak's personal bank
account.
http://nj.gov/oag/newsreleases13/E-Sports_Complaint_Consent-Judgment.pdf
Eric "lpkane" Thunberg
Sean "jaguar" Hunczak
Craig "Torbull" Levine
All we wanted was to reschedule a match..
this is some NSA level type shit
this is some NSA level type shit
THE VINCENT DOCUMENTS
MUH PORRRRRN
THE VINCENT DOCUMENTS
MUH PORRRRRN
Reading this makes me consider saying to hell with e$ea.
Reading this makes me consider saying to hell with e$ea.
this is some serious shit.
WHAT THE FUCK.
TeamfortressTV league please. Make the LAN happend with fundraising. We give to poor childs with cancer, can we do something good related with TF2?
Enigma plz our savior
this is some serious shit.
WHAT THE FUCK.
TeamfortressTV league please. Make the LAN happend with fundraising. We give to poor childs with cancer, can we do something good related with TF2?
Enigma plz our savior
[img]http://i.imgur.com/ItwSMVE.gif[/img]
I don't want to be a part of this league anymore
CEVO next season or ETF2L should make a NA division
I don't want to be a part of this league anymore
CEVO next season or ETF2L should make a NA division
http://nj.gov/oag/newsreleases13/E-Sports_Complaint_Consent-Judgment.pdf
34. Once executed and running on end-users' computers, the ESEA Bitcoin Mining
Code was set to mine for bitcoins only when end-users' were away from their computer. Among
other methods, the code detected whether end-users were active on their computers by
monitoring end-users' mouse movements and/or mouse location.
.35. Defendant Hunczak created at least four bitcoin wallet addresSes where he
deposited bitcoiàs mined from the ESEA Botnet.
36. Defendant Hunczak then sold the bitcoins from the ESEA Botnet, converting the
bitcoins into U.S. dollars. The proceeds were then deposited into Hunczak's personal bank
account.
[quote]34. Once executed and running on end-users' computers, the ESEA Bitcoin Mining
Code was set to mine for bitcoins only when end-users' were away from their computer. Among
other methods, the code detected whether end-users were active on their computers by
monitoring end-users' mouse movements and/or mouse location.
.35. Defendant Hunczak created at least four bitcoin wallet addresSes where he
deposited bitcoiàs mined from the ESEA Botnet.
36. Defendant Hunczak then sold the bitcoins from the ESEA Botnet, converting the
bitcoins into U.S. dollars. The proceeds were then deposited into Hunczak's personal bank
account.[/quote]
So ESEA is selling malware? I guess NA players are very tolerant...
Not even seasonal LANs could make up for this, surely?
So ESEA is selling malware? I guess NA players are very tolerant...
Not even seasonal LANs could make up for this, surely?
I cant handle all of this drama
I cant handle all of this drama
Is this regarding the $1m settlement in NJ, or something else?
EDIT: I guess it is.
Is this regarding the [url=http://www.polygon.com/2013/11/19/5122274/e-sports-entertainment-complaint-user-spying-bitcoin-mining-settlement-new-jersey]$1m settlement in NJ[/url], or something else?
EDIT: I guess it is.
rubikonSo ESEA is selling malware? I guess NA players are very tolerant...
Not even seasonal LANs could make up for this, surely?
ESEA is NA's only TF2 league with LAN finals and a prize pool. Makes people put up with a lot of bullshit.
[quote=rubikon]So ESEA is selling malware? I guess NA players are very tolerant...
Not even seasonal LANs could make up for this, surely?[/quote]
ESEA is NA's only TF2 league with LAN finals and a prize pool. Makes people put up with a lot of bullshit.
l8r client, get off ma shit
l8r client, get off ma shit
That guy has some big volleyball sized balls.
That guy has some big volleyball sized balls.
uninstall client, only install it for games uninstall after. Sounds like a plan!
uninstall client, only install it for games uninstall after. Sounds like a plan!
[youtube]http://www.youtube.com/watch?v=Lnxo7zNZxnc[/youtube]
wait, did this happen again, or is this just last time's issue being sttled in court?
wait, did this happen again, or is this just last time's issue being sttled in court?
Uninstalling the client wouldn't have stopped it from monitoring you. :<
Uninstalling the client wouldn't have stopped it from monitoring you. :<
CondescendingCandlestickwait, did this happen again, or is this just last time's issue being sttled in court?
same issue except now it's worse
[quote=CondescendingCandlestick]wait, did this happen again, or is this just last time's issue being sttled in court?[/quote]
same issue except now it's worse
LOL, didn't refresh. disregard
LOL, didn't refresh. disregard
thank you to the courts for confirming that lpkane was involved from the beginning and that jaguar was just his scapegoat
thank you to the courts for confirming that lpkane was involved from the beginning and that jaguar was just his scapegoat
Who are Hunczak and Thunberg? Torbull and lpkane?
Who are Hunczak and Thunberg? Torbull and lpkane?
potWho are Hunczak and Thunberg?
assuming hunczak is jaguar and thunberg is lpkane
[quote=pot]Who are Hunczak and Thunberg?[/quote]
assuming hunczak is jaguar and thunberg is lpkane