当前位置:网站首页>The harm of game unpacking and the importance of resource encryption
The harm of game unpacking and the importance of resource encryption
2022-07-06 08:34:00 【Fairguard mobile game reinforcement】
In the sub circuit “ The bestselling ”—— B female game
According to the market analysis report of frost Sullivan, a consulting company ,2013-2017 year , The market size of Chinese women's mobile games is calculated by revenue , The compound annual growth rate is 101.6%; expect 2022 year , China's female mobile game market will reach 935 One hundred million yuan .
The market size of Chinese women's mobile games in terms of revenue
Some reports point out , Women are more loyal in mobile games , The willingness to spend time and money on games is stronger . Driven by the continuous rise of women's social status and the increase of female mobile game players , The female game market has obviously become “ The bestselling ”.
Among the female games, the most representative one is the second female game ( A love simulation game with women as the target audience ). According to the huge calculation report ,2021 year 5 month , The number of live broadcasts of b-female game anchors 、 The growth rate of live broadcast duration is higher than that of other games , The number of viewers attracted has increased by 6405%, It is enough to prove the user volume and popularity of b-women Games .
The live broadcast of b-women games increased significantly , The data source is huge
tencent 、 NetEase 、 MIHA tour and other game manufacturers have successively landed at the b-women Game track , I want to share in this .
The network war caused by the unpacking of games with tens of millions of downloads
2021 year 6 month 24 Before going online the next day , Tencent's second female game 《 The love between light and night 》 The number of appointments on the official website has exceeded ten million , Quickly rush to apple after going online App store Top of the free list . As of the date of publication , Seven wheat data display 《 The love between light and night 》 The cumulative download volume of Android is estimated to exceed 3979 Ten thousand times ,iPhone And iPad The total download volume is estimated to exceed 291 Ten thousand times .
《 The love between light and night 》 Android downloads , Data source: Qimai data
And this game with tens of millions of downloads , But because of being unpacked , Caused an unprecedented network storm .
In the game 《 The love between light and night 》 in , The heroine played by the player can attack many male protagonists . It was one of the men who was unpacked this time “ Xia Mingxing ” Birthday card for , It was supposed to be 5 month 22 The information released on the th was released on the social platform by the unpacker nearly a month in advance .
It's like you plan the proposal process without telling your girlfriend , And the other party already knows the details , This sense of surprise and failure triggered the wrath of fans , One after another, they asked the government to deal with the unpackers by legal means .
After the official handed the lawyer's letter to the unpacker , But it caused the dissatisfaction of other players , Before, when other hero game resources were unpacked, the official only sent a Weibo warning , In this way “ Differential treatment ” Let them not accept . thus , The curse war between different camps in a game circle has begun , The official is caught in it , disoriented .
Another Tencent product “ National level ” Mobile Games 《 Glory of Kings 》 I was also troubled by unpacking , In the game “ Five tigers will ”“ Four beauties ” Series of skin Skill effects and some modeling were revealed on major platforms , It triggered players' criticism of the official production level , Finally, overturn and redo , The previous plan was in vain , It's a huge loss .
Unpacking occurs frequently , How to protect game resources ?
Unpacking will have a huge impact on game operation , There are even hidden dangers of game security , Pictures in game resources 、 Video or script , Are the intellectual property of the game , If it is unlocked by the cracker or competitor , Get the content , The impact on the game will be incalculable .
《 halo 4》 Art materials have been plagiarized
Besides , If game resources are modified, they will also produce plug-in effects .
some FPS The game resource material has been modified to be transparent , Realize the perspective effect
Many games now recognize that Assetbundle The importance of resource encryption , But how to encrypt game resources at the same time , Decryption costs very little , This problem has become the pain point of many games .
FairGuard The R & D team spends a lot of time on unity The engine does black box analysis , Make sure. Assetbundle Loading mechanism and its file structure . The following encryption scheme is formulated :
First of all, through the right Assetbundle File structure analysis , Find the core file block of the resource file , Encrypt the core file block , Then when the game is running , Yes unity engine Assetbundle Loading time for burying point , Decrypt the core file block at the buried point .
Before and after encryption Assetbundle Resource effect comparison
边栏推荐
- hutool优雅解析URL链接并获取参数
- Sort according to a number in a string in a column of CSV file
- Golang force buckle leetcode 1020 Number of enclaves
- Use Alibaba icon in uniapp
- JVM performance tuning and practical basic theory - Part 1
- 游戏解包的危害及资源加密的重要性
- The ECU of 21 Audi q5l 45tfsi brushes is upgraded to master special adjustment, and the horsepower is safely and stably increased to 305 horsepower
- logback1.3. X configuration details and Practice
- Zhong Xuegao, who cannot be melted, cannot escape the life cycle of online celebrity products
- Restore backup data on S3 compatible storage with tidb lightning
猜你喜欢
Visual implementation and inspection of visdom
电脑清理,删除的系统文件
Double pointeur en langage C - - modèle classique
【MySQL】日志
Let the bullets fly for a while
Screenshot in win10 system, win+prtsc save location
egg. JS project deployment online server
软件卸载时遇到trying to use is on a network resource that is unavailable
FairGuard游戏加固:游戏出海热潮下,游戏安全面临新挑战
MySQL learning records 12jdbc operation transactions
随机推荐
化不掉的钟薛高,逃不出网红产品的生命周期
【MySQL】日志
Research Report on Market Research and investment strategy of microcrystalline graphite materials in China (2022 Edition)
Report on Market Research and investment prospects of China's silver powder industry (2022 Edition)
2022.02.13 - 238. Maximum number of "balloons"
[cloud native] teach you how to build ferry open source work order system
China high purity silver nitrate Market Research and investment strategy report (2022 Edition)
Restful API design specification
Deep analysis of C language pointer
How to conduct interface test? What are the precautions? Nanny level interpretation
Mobile phones and computers on the same LAN access each other, IIS settings
logback1.3. X configuration details and Practice
Deep analysis of C language data storage in memory
3. File operation 3-with
Bottom up - physical layer
【ROS】usb_cam相机标定
查看局域网中电脑设备
Beijing invitation media
Image, CV2 read the conversion and size resize change of numpy array of pictures
Image,cv2读取图片的numpy数组的转换和尺寸resize变化