Disclosure: On this site you won’t find specific advice on “how to call function xyz()”. Interpreting C++ ARM and #pragma dwim is also out of scope.

We’re treating our readers as intelligent beings who can use Google and/or StackOverflow, where all such specific questions were answered more than once.

What you will find is opinions, more opinions, and even more opinions on all the aspects of software development - and with a large chunk of them based on real-world experience too.

Your mileage may vary. Batteries not included.

 

Bot Fighting 203: (Re)Actors and Short Stacks

Quote: “there will be almost-zero information available via reading the stack frames.”
Another Quote: “If your game is NOT really time-critical – we can go all the way to the full-scale Tor-like network out of obfuscation-only (Re)Actors”
[]

Experience with development server 7x cheaper than Linode/DO

Preamble As I wrote a few weeks ago, I am currently developing an open-souce ithare::obf library. And apparently, to make sure it works more or less consistently, a Damn Lot(tm) of randomized testing (and preferably under different compilers) is necessary. As a result, last week I found myself in a search for a cheap Linux box […]

Bot Fighting 202. Time-Based Protection

Quote: “Whenever we detect that the time spent within a piece-of-non-blocking-code, is more than a few seconds – then, either the system is hopelessly swapping, or we’re being debugged”
Another Quote: “What if we send not just a challenge, but a “challenge which includes some piece of code to be executed on the Client-Side”?”
[]

BDT – Automating Your Application Testing in Behavior-Driven Way

Quote: “Descriptive style takes its roots from the «chain» pattern, in which the methods enclosed in classes return some reference on themselves.”
Another Quote: “Business-driven testing or BDT allows non-technical members of any development team a stronger involvement in the development process by allowing them to comprehend test cases and even create their own. “
[]

Bot Fighting 201. Part 4. Obfuscating Protocols. Versioning.

Quote: “we can handle several Client versions (each with its own obfuscation) with the very same Server.”
Another Quote: “Then, if/when a zero-day bug is encountered in TLS – our obfuscation does provide additional protection even before the attacker can reach the code with that zero-day vulnerability”
[]

Bot Fighting 201, part 3. ithare::obf: An Open Source Data+Source Randomized Obfuscation Library

Quote: “This is all what the-best-available-decompiler was able to do with our obfuscated code”
Another Quote: “Performance-wise, we can do A LOT of obfuscation per network tick”
[]

Bot Fighting 201, Part 2: Obfuscating Literals

Quote: “However, we can (and SHOULD) do MUCH better than that”
Another Quote: “With our approach, each and every obfuscation has to be hacked individually..”
[]