If you were educated on the subject, you’d realize that worrying about packet sniffers in this context is foolish. Which has been my entire point all along, and you seem to have missed it repeatedly.
If you were paying attention, you would realize that he wasn’t saying “worry about packet sniffers,” only that it is a tool available to people today. If you re-read the initial post, you’ll see that he was agreeing with you.
Everyone, calm down. Take a deep breath. Walk outside for a bit. (Unless it’s eleventy-billion degrees, then just look out a window or something.)
I swear, you techno-geeks and your pride… (said the techno-geek.)
And if you were paying attention, you would see that there are any number of tools available to people today, many of which you and others are completely unaware. And yes, he WAS saying he was worried about packet sniffers.
Look, this has nothing to do with pride. It has to do with accurately communicating the appropriate level of concern to a largely tech-ignorant userbase. And having someone on here telling people that packet sniffers should be of concern is useless, irresponsible and inflammatory, because — and let me be quite clear about it this time, since a few of you seem determined to not hear this — packet sniffers are not of use in this scenario to obtain your game account information. Not unless you also assume that those using packet sniffers also have a means to move the extremely large amount of data collected by packet sniffers off of the target network undetected (highly unlikely) and then use sophisticated crypto cracking hardware after reassembling the packet flows for a single customer to expose the account name and password, which are not sent in plaintext (also highly unlikely). And all of this presupposes the attacker has administrative access to a switch between the customer and ArenaNet’s servers, and physical access to connect the necessary hardware to collect the data. Or that the attacker has installed a packet sniffer on the individual customer’s machine, which still has all the problems just listed above to be overcome, not to mention the completely obvious and constant disk access caused by running a packet sniffer in that manner, and the very large amount of space necessary to store the resulting files.
I can formulate any number of attack scenarios that are possible, using off-the-shelf software and hardware and publicly-available techniques. the vast majority of these scenarios also have likelihoods so close to zero as to be pointless to bring up. The use of a packet sniffer to collect an individual’s videogame account information falls squarely into that category.

because it isn’t all that hard to make it look like you are in any country in the world when in fact you aren’t.