当前位置:网站首页>Unity encrypts ASE game data
Unity encrypts ASE game data
2022-06-22 06:01:00 【Vigilance and encouragement】
///
///
DES and ASE Encrypt data
In the game you can open 、 Use or save files and players can also access them in any case , user 、 It is always possible for a system or process to change files . stay PC and Mac On the platform , It is also possible for players to skip editing the file and go directly to RAM Change value in itself , Thus destroying any attempt to protect the file . According to the resources and time available to the player , They can also try to decompile some parts of the game , And find out where any key is stored in the code , Or how all the content is arranged in its internal data structure .
Although some compilation processes can help protect the running memory of the game , And there are ways to better protect files , For example, encrypt them , But the fundamental problem is still one of trust . As a developer , You can trust that your players will not change the game file , Then a simpler solution for reading and writing text files may be the best choice . If you expect some users to try to change values such as save files , Then it may be a good choice to use encryption and other methods for sensitive data . If you feel you can't trust your players , please remember , The only perfect solution to ensure complete security is to make your game impossible for any player . All digital interactions carry a certain degree of information risk .
Problems with the operation of existing game data files
Use Unity All common solutions for processing game data exist where the player may change the file in which the data is saved
边栏推荐
- tmux -- ssh terminal can be closed without impact the server process
- MFC tabctrl control to modify label size
- Signal output library
- Ethernet communication protocol
- Link a static library‘s all sections
- Clion installation Download
- Tensorflow 2. Chapter 14: callbacks and custom callbacks in keras
- vscode极简安装教程
- 400-哈希表(1. 两数之和、454. 四数相加 II、383. 赎金信)
- Adaboost
猜你喜欢

Beifeng helps Nanchang Emergency Management Bureau to build a public-private integrated emergency communication guarantee network

Xshell download and installation (solve the problem of expired evaluation)

Unity app提高设备可用性

微信小程序开发 第一周:页面设置、页面跳转、数据绑定

What about computer jam?

402-字符串(题目:剑指Offer58-II.左旋转字符串、 28. 实现 strStr()、459.重复的子字符串)

CLion安装下载

D3D learning notes (1) - Introduction to the use conditions of autodraw at so stage

以太网UDP帧发包设计

MFC tab control add Icon
随机推荐
Matlab system identification
非传递骰子(春季每日一题 51)
QEMU ARM interrupt system architecture 2
基于CRU中的tmp数据进行年平均气温分析
机器学习笔记 七:强大的神经网络表述
D3D学习笔记(1)—— SO 阶段介绍 AutoDraw使用条件
Linear regression: least squares, Tellson estimation, RANSAC
數據的存儲(進階)
Frame profiling
TCP connection details
JTAG interface
Assertion based validation
Test platform for combinational logic blocks
机器学习笔记 八:Octave实现神经网络的手写数字识别
从转载阿里开源项目 Egg.js 技术文档引发的“版权纠纷”,看宽松的 MIT 许可该如何用?
使用Systemverilog描述状态机
400 hash table (1. sum of two numbers, 454. sum of four numbers II, 383. ransom letter)
idea插件EasyCode的使用
CMAKE notes
GrabCut分析