47
submitted 7 months ago by ylai@lemmy.ml to c/gamedev@programming.dev
you are viewing a single comment's thread
view the rest of the comments
[-] dev_null@lemmy.ml 2 points 7 months ago* (last edited 7 months ago)

All your examples are obfuscating executables. None of which is happening here. Every software that connects to the Internet handles encrypted data and there is nothing suspicious about it.

If code isn't obfuscated you can do an analysis what kinda stuff closed source software does.

And what does that change in it being a "trust me bro" situation? Nobody does that. Are you reverse engineering all software you use, don't use any software that has an ability to update, and compile all software you use yourself? Because otherwise you are trusting the developers.

We are talking about a video game. The vast majority of games on PC are released through launchers like Steam which keep updating them. You'd have to spend months reverse engineering a game to know for sure it doesn't do anything you don't like, and disable updates. Nobody does that.

this post was submitted on 01 Apr 2024
47 points (98.0% liked)

Game Development

3412 readers
4 users here now

Welcome to the game development community! This is a place to talk about and post anything related to the field of game development.

Community Wiki

founded 1 year ago
MODERATORS