Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The “stolen” constants/instructions are bits of code that were in the original (VM-obfuscated) binary. These constants/instructions are deleted from the binary and provided by the server in an obfuscated form. Effectively, the binary you get when buying the game is incomplete: you get a dynamic, encrypted, system-dependent patch from the server that supplies the missing pieces (the “stolen” pieces).


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: