I wonder if someone finally found a program that rolls through random numbers and letters looking for keys? D:
IT'S THE END OF THE WORLD.
Ok, with this, I should explain how the key system works.
When you log on it tells the authentication server your key. Then when it recieves it, it sees if it is a real key. basically, it just sees if it fits the algorithm that badspot made. If it does not, it returns an error. Once it is done it does a check of every activated key. When a key is bought, it is bound to the next available ID. Basically, it says that <key> = <ID>. So as the authentication server checks if it is bound to an ID, it goes through every bound ID to see if it is a match. If not, it returns an error.
So there are 3 types of "keys"
Keys that are bound - 14,000 or so
unused keys - millions
fake keys. - even more
I have seen people who have seen people who had put in an unbound key, but it would not work. It is all a matter of if the key is bound to an ID or not.