当前位置:网站首页>The harm of game unpacking and the importance of resource encryption
The harm of game unpacking and the importance of resource encryption
2022-07-06 08:34:00 【Fairguard mobile game reinforcement】
In the sub circuit “ The bestselling ”—— B female game
According to the market analysis report of frost Sullivan, a consulting company ,2013-2017 year , The market size of Chinese women's mobile games is calculated by revenue , The compound annual growth rate is 101.6%; expect 2022 year , China's female mobile game market will reach 935 One hundred million yuan .
The market size of Chinese women's mobile games in terms of revenue
Some reports point out , Women are more loyal in mobile games , The willingness to spend time and money on games is stronger . Driven by the continuous rise of women's social status and the increase of female mobile game players , The female game market has obviously become “ The bestselling ”.
Among the female games, the most representative one is the second female game ( A love simulation game with women as the target audience ). According to the huge calculation report ,2021 year 5 month , The number of live broadcasts of b-female game anchors 、 The growth rate of live broadcast duration is higher than that of other games , The number of viewers attracted has increased by 6405%, It is enough to prove the user volume and popularity of b-women Games .
The live broadcast of b-women games increased significantly , The data source is huge
tencent 、 NetEase 、 MIHA tour and other game manufacturers have successively landed at the b-women Game track , I want to share in this .
The network war caused by the unpacking of games with tens of millions of downloads
2021 year 6 month 24 Before going online the next day , Tencent's second female game 《 The love between light and night 》 The number of appointments on the official website has exceeded ten million , Quickly rush to apple after going online App store Top of the free list . As of the date of publication , Seven wheat data display 《 The love between light and night 》 The cumulative download volume of Android is estimated to exceed 3979 Ten thousand times ,iPhone And iPad The total download volume is estimated to exceed 291 Ten thousand times .
《 The love between light and night 》 Android downloads , Data source: Qimai data
And this game with tens of millions of downloads , But because of being unpacked , Caused an unprecedented network storm .
In the game 《 The love between light and night 》 in , The heroine played by the player can attack many male protagonists . It was one of the men who was unpacked this time “ Xia Mingxing ” Birthday card for , It was supposed to be 5 month 22 The information released on the th was released on the social platform by the unpacker nearly a month in advance .
It's like you plan the proposal process without telling your girlfriend , And the other party already knows the details , This sense of surprise and failure triggered the wrath of fans , One after another, they asked the government to deal with the unpackers by legal means .
After the official handed the lawyer's letter to the unpacker , But it caused the dissatisfaction of other players , Before, when other hero game resources were unpacked, the official only sent a Weibo warning , In this way “ Differential treatment ” Let them not accept . thus , The curse war between different camps in a game circle has begun , The official is caught in it , disoriented .
Another Tencent product “ National level ” Mobile Games 《 Glory of Kings 》 I was also troubled by unpacking , In the game “ Five tigers will ”“ Four beauties ” Series of skin Skill effects and some modeling were revealed on major platforms , It triggered players' criticism of the official production level , Finally, overturn and redo , The previous plan was in vain , It's a huge loss .
Unpacking occurs frequently , How to protect game resources ?
Unpacking will have a huge impact on game operation , There are even hidden dangers of game security , Pictures in game resources 、 Video or script , Are the intellectual property of the game , If it is unlocked by the cracker or competitor , Get the content , The impact on the game will be incalculable .
《 halo 4》 Art materials have been plagiarized
Besides , If game resources are modified, they will also produce plug-in effects .
some FPS The game resource material has been modified to be transparent , Realize the perspective effect
Many games now recognize that Assetbundle The importance of resource encryption , But how to encrypt game resources at the same time , Decryption costs very little , This problem has become the pain point of many games .
FairGuard The R & D team spends a lot of time on unity The engine does black box analysis , Make sure. Assetbundle Loading mechanism and its file structure . The following encryption scheme is formulated :
First of all, through the right Assetbundle File structure analysis , Find the core file block of the resource file , Encrypt the core file block , Then when the game is running , Yes unity engine Assetbundle Loading time for burying point , Decrypt the core file block at the buried point .
Before and after encryption Assetbundle Resource effect comparison
边栏推荐
- Analysis of pointer and array written test questions
- CISP-PTE实操练习讲解
- The mysqlbinlog command uses
- Use Alibaba icon in uniapp
- Bottom up - physical layer
- pcd转ply后在meshlab无法打开,提示 Error details: Unespected eof
- Trying to use is on a network resource that is unavailable
- [cloud native] teach you how to build ferry open source work order system
- Pointer advanced --- pointer array, array pointer
- Vocabulary notes for postgraduate entrance examination (3)
猜你喜欢
pytorch训练好的模型在加载和保存过程中的问题
Summary of phased use of sonic one-stop open source distributed cluster cloud real machine test platform
2. File operation - write
2022 Inner Mongolia latest construction tower crane (construction special operation) simulation examination question bank and answers
Fibonacci sequence
All the ArrayList knowledge you want to know is here
win10系统中的截图,win+prtSc保存位置
Analysis of pointer and array written test questions
根据csv文件某一列字符串中某个数字排序
MySQL learning records 12jdbc operation transactions
随机推荐
Verrouillage [MySQL]
Deep analysis of C language pointer
[cloud native topic -45]:kubesphere cloud Governance - Introduction and overall architecture of enterprise container platform based on kubernetes
电脑清理,删除的系统文件
704 二分查找
深度剖析C语言数据在内存中的存储
角色动画(Character Animation)的现状与趋势
JVM performance tuning and practical basic theory - Part 1
Day29-t77 & t1726-2022-02-13-don't answer by yourself
[brush questions] top101 must be brushed in the interview of niuke.com
个人电脑好用必备软件(使用过)
C language - bit segment
gcc动态库fPIC和fpic编译选项差异介绍
Fibonacci sequence
Unified ordering background interface product description Chinese garbled
China Light conveyor belt in-depth research and investment strategy report (2022 Edition)
vulnhub hackme: 1
leetcode刷题 (5.31) 字符串
Char to leading 0
egg. JS getting started navigation: installation, use and learning