Hand travel safety also needs to start from the source protection

Source: Internet
Author: User
Keywords Mobile games mobile network games mobile games

Mobile phone's rise led to the rapid development of the hand market, 2014, mobile gaming market full force, a variety of popular hand swim endless, a large number of top hand products instantly occupied the entire mobile phone game market. Authoritative data shows that the real sales of China's mobile game market from 2012 to 11.24 billion yuan in 2013, an increase of 246.9%, hand-tour users from 2012 89 million rapid growth to 2013 310 million, growth of up to 248.5%.

These data are indeed very attractive, hand tour industry in full swing development, developers are also hard to fight the operation of data, spell the water, then, in addition to these data, developers need to care about what data?

According to the investigation, 2014 because the hand swims the crack causes the game industry to lose in 2 billion yuan, the handset swims the market because the whole year direct loss nearly 500 million yuan, but in the single hand swims the market, the income TOP100 the single game according to calculate that has 30% to be cracked. It is estimated that the crack at least caused about 2% of potential paid players directly lost, long tail game to break the awareness of the worse, pay players lost higher, estimated at 5%. According to the ratio of income to the weight of the single market to break the direct loss of 20 million yuan per month, single hand tour market direct loss of 240 million yuan a year.

The data are also worth the attention of game makers.

What do you do after the game is cracked?

Hand tour is malicious cracked, hackers in two of packaging, implanted ads, rely on to obtain advertising revenue. It is understood that "two times packaging" has formed a gray industrial chain, which involves the "packaging party", advertisers, advertising alliances. There are news reports of the "packing party" of the monthly income of millions, so under this windfall, more and more people to join the ranks, so there are more and more games have been poisoned.

In addition to advertising, the implantation of malicious code is also commonly used by hackers, through the implantation of malicious code, theft of user privacy or property, hackers use these malicious code to the user's mobile phone remote control, the implementation of the replacement or deletion of the user's mobile phone related data, theft of user privacy secretly upload, download the Call the designated phone and other dangerous operations, and the blame is often the game manufacturer. such as the previous period is very popular Flappybird hand tour encountered a virus injection, was tampered with the version of the application to send and receive text messages, background download software and many other rights, once it is run, will steal the deduction of SMS, background download and application, directly caused by the loss of user fees.

In addition, the emergence of a variety of plug-ins to the game manufacturers caused huge losses, package modification, script recording, accelerator and other external behavior are threatening the normal operation of the game, seriously affecting the game data and servers, resulting in slow game speed, data errors, increase the pressure on the server; In addition, plug will also destroy the balance of the game, Greatly damaged the game's entertainment, resulting in a large number of normal users lost. In the combination of a lot of damage, no as the hand tour products can only silently wait for death, the choice of rights of the hands of the developers are few.

Hand travel safety also needs to start from the source protection

Hand travel safety also needs to be protected from the source, however, not all teams have the ability to invest heavily in the development of advanced protection technology for their own games, to ensure the safety of their own game, even if the effort to research and development, subsequent compatibility, technology upgrades and other issues are enough to cause headaches and give up, and the cost of investment will still be risky, Not to mention personal developers.

So, is there a low-cost and efficient way to protect it? To this end, small wired mobile security industry well-known companies love encryption technology director Lin Wei, hope to get more hand-travel protection methods.

Lin Wei told the little editor that there are now some basic protection methods for APK internal files, including the use of pseudo-encryption protection to strengthen the APK, the APK (compressed files) through Java code to the pseudo-reinforcement, and through the flag tail to add additional data to prevent the PC tool decompression to prevent decompile, APK strengthen the protection of resource files to prevent the destruction of readable files such as pictures and videos. However, these protection methods on the Internet have a tutorial, for hackers are also familiar with, and for application development of enterprises and individuals, the research of app reinforcement technology needs to devote a lot of time and people energy, still easy to be cracked.

Of course, it's also a good idea to find a third-party mobile security provider for encryption protection, targeted to the mobile game encryption protection, professional prevention of two packaging, malicious tampering and other malicious acts, more fundamentally eliminate the game plug, game modification, game Hanging Machine script recording, accelerator use and simulator operation risk, Game resource files are stolen and tampered with. Lin Wei told the small, love encryption has launched a detailed hand-proofing solutions, can be customized for the above items to protect, welcomed the development of manufacturers experience.

Hand tour industry flourish at the same time, hand tour developers and teams are facing more and more intense competition, hand travel security issues are more and more attention, plug non-stop, piracy constantly, packaging party relies on two packs game monthly income million, and developers are looking at their own results stolen stolen. Therefore, to ensure the security of applications, developers must be from the source of the rival app for security, whether it is their own research and development of anti-cracking technology or use of Third-party encryption technology, developers need to protect the awareness of hand travel and take appropriate measures to fundamentally eliminate the game of piracy, do not give packaging party any opportunity.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.