What's new
  • Visit Rebornbuddy
  • Visit Panda Profiles
  • Visit LLamamMagic
  • Visit Resources
  • Visit Downloads
  • Visit Portal

Encryptation

Sckauter

Member
Joined
May 9, 2012
Messages
213
Reaction score
0
This could sound silly but i wounder if i encrypt WoW game folder is safe or not :confused:

Could encryptation prevent blizzard bot detection? If yes, is against their ToS?

What do you think guys?
 
Hi, Sckauter,

Encryption is meant to protect you if your computer gets stolen. It will not shield you against Bliz detection.

cheers,
chinajade
 
Ty chinajade,

because blizzard get information about the game we are running in our machine, would be nice if we encrypt the game folder and blizzard only gets a bunch of binaries instead real information :cool:
 
If you encrypt your game folder and if Blizzard gets a bunch of binaries you will be insta-flagged. If you have nothing to reproach yourself, why you'll encrypt your information?
 
The way encryption works is by translating the data into what appears to be random bytes of data based on the translations within your certificate. Of course there are other forms of encryption and methods to encrypt information, but here we are speaking strictly on behalf of how the industry standard of digital encryption functions. While the data is in an encrypted state, you don't really know what you're looking at until you find a header, if the header is stored on the same medium you have access to (some people store their headers or build them each time they want to decrypt their data depending on the sensitivity of the information), etc. However, this data requires a certificate that contains the data needed to "translate" the data while it is in an encrypted state. Once the data enters your memory and read, it is essentially no longer encrypted as the data is being translated from an encrypted state to be decoded and read within the memory and processed. With the exception of instruction code encryption which I believe was created by Intel (which only protects the data while it is in transit to the CPU from your RAM and so forth), there is one flaw in encryption, once the data is translated, it is essentially no longer encrypted. This is a fundamental flaw in every implementation of industry standard encryption because no matter what happens, it does enter a decrypted state at some point in the information flow. However, there are ways to manipulate the information that is in the memory and keep Blizzard from reading it, which is already done with how Tripwire is implemented and that's where I'll leave it.

A great example is when you encrypt your data and get yourself infected in any way that allows access to your data, such as backdoored or shelled (the most dangerous forms of having someone or something possess remote access over your machine because someone can leverage legitimate dependencies in your system to exfiltrate the information) even with FDE (Full disk encryption), once it is read and decrypted, anyone can exfiltrate the information, but there are also ways you can keep that from happening as well, but most individuals don't have any clue how deep that rabbit hole goes.

This is just a brief summary, as there are more in depth explanations I can give you, but you just need a general understanding of how the information is encrypted, stored and decrypted. If you want more information, I suggest you purchase a book or start reading on Wikipedia or some journals published by well reputed colleges and individuals within the industry.
 
Last edited:
The way encryption works is by translating the data into what appears to be random bytes of data based on the translations within your certificate. Of course there are other forms of encryption and methods to encrypt information, but here we are speaking strictly on behalf of how the industry standard of digital encryption functions. While the data is in an encrypted state, you don't really know what you're looking at until you find a header, if the header is stored on the same medium you have access to (some people store their headers or build them each time they want to decrypt their data depending on the sensitivity of the information), etc. However, this data requires a certificate that contains the data needed to "translate" the data while it is in an encrypted state. Once the data enters your memory and read, it is essentially no longer encrypted as the data is being translated from an encrypted state to be decoded and read within the memory and processed. With the exception of instruction code encryption which I believe was created by Intel (which only protects the data while it is in transit to the CPU from your RAM and so forth), there is one flaw in encryption, once the data is translated, it is essentially no longer encrypted. This is a fundamental flaw in every implementation of industry standard encryption because no matter what happens, it does enter a decrypted state at some point in the information flow. However, there are ways to manipulate the information that is in the memory and keep Blizzard from reading it, which is already done with how Tripwire is implemented and that's where I'll leave it.

A great example is when you encrypt your data and get yourself infected in any way that allows access to your data, such as backdoored or shelled (the most dangerous forms of having someone or something possess remote access over your machine because someone can leverage legitimate dependencies in your system to exfiltrate the information) even with FDE (Full disk encryption), once it is read and decrypted, anyone can exfiltrate the information, but there are also ways you can keep that from happening as well, but most individuals don't have any clue how deep that rabbit hole goes.

This is just a brief summary, as there are more in depth explanations I can give you, but you just need a general understanding of how the information is encrypted, stored and decrypted. If you want more information, I suggest you purchase a book or start reading on Wikipedia or some journals published by well reputed colleges and individuals within the industry.

everything that you just said will be complete gibberish to 99% of the people who read it
 
lol...you can encrypt the complete hdd and not only game folder...for securities reason ...

Lolzagain,

Encryption will not serve the purpose of his idea of a impenetrable client while he utilizes third party software that relies on reverse engineering the game client. End of story.

it's copy paste ))

Lolzagain,

I personally invite you to show me where I have plagiarized. I gave it my best attempt to dumb down the explanation as best as I could with the time I do have and the little interest I take in educating individuals such as yourself. I possess my Masters in Computer Science and a Bachelors in Computer Science and Information Systems with a minor in business. I do not need to copy and paste a basic concept that has been around for thousands of years, of which is pertaining to information security. Though, if I were as ignorant as you were, I would pass such a judgement upon you, despite the fact that I do know you would require such pathetic assistance in acting as a conduit for basic knowledge.

Have a great day,
 
Last edited:
If you encrypt your game folder and if Blizzard gets a bunch of binaries you will be insta-flagged. If you have nothing to reproach yourself, why you'll encrypt your information?

Exercising privacy does not make you guilty of anything. Also I don't think that word means what you think it means.
 
Exercising privacy does not make you guilty of anything. Also I don't think that word means what you think it means.

It doesn't matter if it does or doesn't make you guilty...All it does is make it seem like you're trying to hide something, which in turn makes them more likely to investigate you, which in turn leads to them finding you guilty.

You want to know the best way to avoid being detected no matter what you're doing? Try and look like you're doing what everyone else is doing.
 
Back
Top