Install Steam
login
|
language
简体中文 (Simplified Chinese)
繁體中文 (Traditional Chinese)
日本語 (Japanese)
한국어 (Korean)
ไทย (Thai)
Български (Bulgarian)
Čeština (Czech)
Dansk (Danish)
Deutsch (German)
Español - España (Spanish - Spain)
Español - Latinoamérica (Spanish - Latin America)
Ελληνικά (Greek)
Français (French)
Italiano (Italian)
Bahasa Indonesia (Indonesian)
Magyar (Hungarian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português (Portuguese - Portugal)
Português - Brasil (Portuguese - Brazil)
Română (Romanian)
Русский (Russian)
Suomi (Finnish)
Svenska (Swedish)
Türkçe (Turkish)
Tiếng Việt (Vietnamese)
Українська (Ukrainian)
Report a translation problem
Now it all makes sense!
what is doping=duping ?
Read the original post, I am sure you will figure it out.
I recently blocked about 30 accounts, mostly from China, who bought $1 worth of phish coins using stolen credit cards, and then multiplied them by 20-40 thousand using a hole in the game and hacking software. The hole is closed, accounts are blocked.
However, attempts to exploit this vulnerability are being recorded.. So, for example, there are already 5 people who are trying to continue cloning objects using the old hole.
Obviously it was unstable CPU overclock that corrupted relevant memory region and accidentally duped the items. :D