Timeline for How can I prevent false score reports to global highscore tables?
Current License: CC BY-SA 3.0
9 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Jul 5, 2014 at 13:10 | history | edited | Anko | CC BY-SA 3.0 |
Grammar and formatting. Some wording clarifications.
|
| Feb 15, 2012 at 11:55 | comment | added | kaoD | This is a very good example of en.wikipedia.org/wiki/Security_through_obscurity | |
| Feb 15, 2012 at 8:33 | comment | added | o0'. | This is a terribly weak technique, which will give to the developers a very false sense of security. | |
| Oct 6, 2010 at 17:06 | comment | added | Ellis | Yes, i know it. In france, we do the same in few engineering schools. It is the same problem as copy protection. It it not the perfect solution. But in many cases, it is sufficient. My opinion because i made just little games. | |
| Oct 6, 2010 at 12:49 | comment | added | user744 | A standard undergraduate exercise, at least in US universities, is to reverse-engineer passwords constructed as you describe, by reading y86 (cgi2.cs.rpi.edu/~hollingd/comporg-spring2007/notes/Y86/…) assembly code. | |
| Oct 4, 2010 at 12:10 | vote | accept | teedyay | ||
| Oct 1, 2010 at 18:18 | comment | added | Ellis | This is an Android Application in native C++. There is no symbol, nor good debugger available. So you can read the ARM code, but not trace it easily. The key is composed by multiple operations so find all strings is not sufficient. That is not perfect but quite painful. | |
| Oct 1, 2010 at 10:46 | comment | added | Kylotan | I'm quite dubious that reverse engineering to find your magic string would be all that difficult. | |
| Sep 30, 2010 at 15:50 | history | answered | Ellis | CC BY-SA 2.5 |