• RonSijm
    link
    fedilink
    arrow-up
    18
    ·
    8 months ago

    Basso is at least confident that data miners can’t brute force their way to discovering his encrypted secrets. He’s using industry-standard AES encryption. ”It’s pretty secure, unless we get quantum computers or there’s some giant vulnerability,” he said.

    It’s a fun idea, I guess, but I don’t know how happy anti-virus kinda services are with having loads of very encrypted and obscured blocks of data.

    It’s a bit of a “trust me bro” situation where he claims he’s just hiding secret levels and stuff - and isn’t also secretly side-loading malware or something like that

    • Aux@lemmy.world
      link
      fedilink
      arrow-up
      20
      arrow-down
      1
      ·
      8 months ago

      Anti viruses won’t care as it won’t be injecting executable code. But the whole idea won’t work. To decrypt AES you need some sort of a secret key or certificate. So the game will have to have it bundled. Thus anyone with enough skill will be able to extract such key or certificate and decode resources themselves. Encryption will not provide any protection.

      • NocturnalMorning@lemmy.world
        link
        fedilink
        arrow-up
        7
        ·
        8 months ago

        Stuff like this isn’t there to stop people with lots of resources. It’s to stop people who are lazy, will see encryption and go, eh, I guess I’m not doing that after all.

        It’s the baseline, make it annoying enough that most people won’t even bother wasting their time.

        • Aux@lemmy.world
          link
          fedilink
          arrow-up
          4
          arrow-down
          2
          ·
          8 months ago

          I bet you that the whole thing will be decrypted and sent to torrents during the first hour of the game’s release just to teach its developer a lesson.

      • RonSijm
        link
        fedilink
        arrow-up
        4
        ·
        8 months ago

        Anti viruses won’t care as it won’t be injecting executable code.

        How do you know parts of the encrypted stuff isn’t executable code? Like is he has secret levels with secret functionalities then part of whats encrypted might get executed, or interpreted and executed or something like that.

        If he’s going out of his way to hide and encrypt secrets, I wouldn’t be surprised if parts of his gameloop are obfuscated as well. And if Anti viruses detect high levels of obfuscation, that just raises flags as probabilistic malware

        • Aux@lemmy.world
          link
          fedilink
          arrow-up
          1
          arrow-down
          2
          ·
          8 months ago

          Modern CPUs and operating systems have distinction between data and code in memory. Usually only privileged processes have the right to make data executable. If you load some random stuff into memory and tell your CPU to execute it as a code, you’ll get nuked by OS.

          • uis@lemmy.world
            link
            fedilink
            arrow-up
            1
            ·
            7 months ago

            Usually only privileged processes have the right to make data executable.

            Not true. Only kernel can mark memory page as executable, but any process can request to kernel to do so. This is why JIT compilers work.

      • nik9000
        link
        fedilink
        arrow-up
        3
        ·
        8 months ago

        It sort of looked like you’d construct the key by input. Like an old school password entry screen or something. I wonder if you could correct horse battery stapler it enough to have a respectable key length.

      • Pennomi@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        8 months ago

        The only way is to hold that secret key on your server until the day of content release. But that is basically a lite version of always online DRM.

      • 2ncs@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        7 months ago

        To decrypt AES you need some sort of a secret key or certificate. So the game will have to have it bundled.

        If the Dev were to take, for example the x,y position of the player and convert that to a key, then there would not be any bundled key. This could allow specific conditions to be met without specifying the key or solution. Truthfully though, I don’t know much about AES to know if that’s possible.

        • uis@lemmy.world
          link
          fedilink
          arrow-up
          1
          ·
          7 months ago

          You still need

          1. Trigger not at exact coordinates, but in some proximity.
          2. Test condition in near-realtime
      • pantyhosewimp@lemmynsfw.com
        link
        fedilink
        arrow-up
        1
        ·
        8 months ago

        the key to unlock them will not also be buried in the code.

        “You have to sort of input it through playing the game, to the credits and some later sections,” he said.

        With luck, that means no one will crack it until someone plays to the point of figuring it all out.

        • Aux@lemmy.world
          link
          fedilink
          arrow-up
          2
          arrow-down
          2
          ·
          8 months ago

          As I said, I bet everything will be decrypted within an hour of release.

      • Mikina
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        8 months ago

        Anti viruses won’t care as it won’t be injecting executable code.

        When I first started working on malware for my offensive cybersec job, I felt pretty at loss about how the fuck are you supposed to execute anything, if you simply have to 1) allocate memory with READ_WRITE_EXECUTE, and then 2) execute the memory.

        I thought that’s something that legit programs don’t have any reason to do - why would you ever need to allocate RWX memory? I’ve never done that in my entire programming career, and every bit of your code is already loaded into memory once you start the program - at a special, protected part of memory. There’s no reason to ever allocate anything manually. And I spent a lot of time trying to figure out how to deal with this issue when writing malware, since I kind of expected that once you try to allocate RWX memory manually, and god-forbid execute it the AV will simply not allow it and flag it as highly suspicious.

        Well. It turned out that actually almost everything I’ve ever written does use this call. A lot. That’s when I learned what “JIT compilation” means, and that I’ve really misunderstood the basic concepts of C#.

        So, surprisingly, most of programs you run (that are in C#) actually inject executable code at runtime. Although, I’m not sure if Unity actually doesn’t compile into something that’s not JIT C#. I guess only if you use ILL2CPP?

    • juliebean@lemm.ee
      link
      fedilink
      arrow-up
      10
      ·
      8 months ago

      It’s a bit of a “trust me bro” situation

      i mean, the same could be said of literally any closed source software.

      • RonSijm
        link
        fedilink
        arrow-up
        3
        ·
        8 months ago

        Not really - “Everything is open-source if you know Assembly” - Look at Ghidra for example.

        If code isn’t obfuscated you can do an analysis what kinda stuff closed source software does. In C# (so if his game is written in Unity) you can even get very close to the original source code (IL code reversed back to C#).

        That’s why I mentioned anti-virus isn’t going to be happy about it. You can easily google examples: examples[1] example[2] example[3] - that obfuscating is a red flag to a lot of anti-virus

        • dev_null@lemmy.ml
          link
          fedilink
          arrow-up
          2
          ·
          edit-2
          8 months ago

          All your examples are obfuscating executables. None of which is happening here. Every software that connects to the Internet handles encrypted data and there is nothing suspicious about it.

          If code isn’t obfuscated you can do an analysis what kinda stuff closed source software does.

          And what does that change in it being a “trust me bro” situation? Nobody does that. Are you reverse engineering all software you use, don’t use any software that has an ability to update, and compile all software you use yourself? Because otherwise you are trusting the developers.

          We are talking about a video game. The vast majority of games on PC are released through launchers like Steam which keep updating them. You’d have to spend months reverse engineering a game to know for sure it doesn’t do anything you don’t like, and disable updates. Nobody does that.

    • dev_null@lemmy.ml
      link
      fedilink
      arrow-up
      3
      ·
      8 months ago

      I don’t know how happy anti-virus kinda services are with having loads of very encrypted and obscured blocks of data

      As happy as with any other file. Would be pretty silly if preloading a game on Steam pre-release would trigger AVs.