Skip to main content

G2A tightens seller verification procedure amid chargeback controversy

g2a tightens seller verification header
G2A/Facebook
G2A has announced plans to beef up its verification process for new sellers, in response to recent accusations of lost revenue levied against the site by developers.

Effective immediately, new sellers will have to provide verification via a social media account, an active phone number, and will only be able to sell 10 products until further proof of identification is supplied, according to a report from Engadget.

Recommended Videos

In the coming months, this will be complemented by measures that verify a seller’s credit card details, their PayPal credentials, and their home address.

G2A is an online marketplace where users can sell game keys that were purchased elsewhere. Unfortunately, less honest users have been known to abuse this system by purchasing keys legitimately, selling them via G2A, then requesting a chargeback on their credit card.

This issue came to the fore back in June, when the CEO of indie studio TinyBuild took G2A to task on the situation, as detailed by Game Informer. Alex Nichiporchik accused the site of causing his studio to lose out on $450,000 in revenue, although G2A suggested that figure had been exaggerated.

The lost revenue was due to mass use of the sell-then-chargeback scheme. While G2A attempts to keep sellers in line and ban those who use fraudulent practices, the ease of creating new accounts made the company’s attempt at policing its users ineffective.

However, it’s clear that the very public dispute has prompted G2A to fortify its relationship with developers. In June, the site announced the Game Developer Support System, which will help studios stake their claim to a portion of the profits from any of their games sold on the marketplace.

Between the new verification requirements and a commitment to sharing royalties, G2A should be commended for taking a proactive approach to a situation that could wreak financial havoc on promising independent studios. That said, it’s perhaps too early to determine whether these measures go far enough — and there are certainly questions to be asked about the  system of vetting vendors that was in place beforehand.

Brad Jones
Former Digital Trends Contributor
Brad is an English-born writer currently splitting his time between Edinburgh and Pennsylvania. You can find him on Twitter…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more