Hacker News new | past | comments | ask | show | jobs | submit login

I have been doing a bit of reverse engineering on a popular Horde/Alliance based MMO game and it follows almost the exact same steps (including the FNV32 export hashes). It almost seems very similar as I have seen it employ very similar tricks. I wonder if it's packed using the same protection?



The source 2 engine also uses fnv to hash the schema (basically entity properties)


would make sense to reuse warden for Activision IP post merge




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: