• RonSijm@programming.dev
    link
    fedilink
    arrow-up
    4
    ·
    8 months ago

    Anti viruses won’t care as it won’t be injecting executable code.

    How do you know parts of the encrypted stuff isn’t executable code? Like is he has secret levels with secret functionalities then part of whats encrypted might get executed, or interpreted and executed or something like that.

    If he’s going out of his way to hide and encrypt secrets, I wouldn’t be surprised if parts of his gameloop are obfuscated as well. And if Anti viruses detect high levels of obfuscation, that just raises flags as probabilistic malware

    • Aux@lemmy.world
      link
      fedilink
      arrow-up
      1
      arrow-down
      2
      ·
      8 months ago

      Modern CPUs and operating systems have distinction between data and code in memory. Usually only privileged processes have the right to make data executable. If you load some random stuff into memory and tell your CPU to execute it as a code, you’ll get nuked by OS.

      • uis@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        7 months ago

        Usually only privileged processes have the right to make data executable.

        Not true. Only kernel can mark memory page as executable, but any process can request to kernel to do so. This is why JIT compilers work.