Install Steam
login
|
language
简体中文 (Simplified Chinese)
繁體中文 (Traditional Chinese)
日本語 (Japanese)
한국어 (Korean)
ไทย (Thai)
Български (Bulgarian)
Čeština (Czech)
Dansk (Danish)
Deutsch (German)
Español - España (Spanish - Spain)
Español - Latinoamérica (Spanish - Latin America)
Ελληνικά (Greek)
Français (French)
Italiano (Italian)
Bahasa Indonesia (Indonesian)
Magyar (Hungarian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português (Portuguese - Portugal)
Português - Brasil (Portuguese - Brazil)
Română (Romanian)
Русский (Russian)
Suomi (Finnish)
Svenska (Swedish)
Türkçe (Turkish)
Tiếng Việt (Vietnamese)
Українська (Ukrainian)
Report a translation problem
GameSparks collects and creates data charts for the Pimps to get better idea of how we play. Which will in turn help them balance aspects of the game better.
As someone who is passably knowledgeable with ip traffic analysis and security in general, I can tell you that the contents of the packets are almost certainly compressed. This means that they will show as binary gunk in your analyzer. Which means that even with a packet sniffer you probably won't know what data is being sent without some serious work. You can tell what thread is sending data, to what remote addresses, whether it was a push or pull operation, (did your machine send it or did the remote machine request information), what ports it is using, the amount of data, and maybe a few other details, but that's about it.
The main thing to look for is not the ip traffic so much as what it accesses in your computer. If gamesparks accesses only memory and files from the game then there's no issue. If gamesparks tries to access memory outside the game, files not game related, change internet access, the registry, or spawn other processes that don't have a command line, then you look deeper.
Oh totally, but before even going out the ip interface the game has to send the data to the GameSparks dll, and that interface is where I'm really going to be gathering my info I think. I would guess by your phrasage that your level of knowledge is comparable to mine, although mine may have been more in depth at one time I am guessing yours is more recent as I've been on a break, so speak, for some years. Of course that "mine may have been more in depth" assumption is probably because you were simplifying for your audience, like I did, and we thought each other simple due to our simplifications. Heh. :)
a) that sort of misses the major point that gamesparks dll can potentially gather data on its own without it being sent by the game. I already know that 7dtd.exe doesn't do any of the dangerous stuff (like reading private files) I listed above. Therefore that data won't come from the game.
b) how exactly do you plan on sniffing the interface between two processes at runtime?
The purpose of this thread is twofold, 1) To discuss, as is generally relevant to us all as gamers, the topic of spyware included in games, and 2) to report anything I learn from whatever investigation I do, once the experimental version of alpha 19 becomes available to me in roughly 13 days.
I have not planned my approach in great detail at this moment, as I'm only just now finishing the introductory section of the GameSparks API documentation. And I don't intend to talk out my ass about things I haven't learned yet. I am merely confidant that with the tools at my disposal it shouldn't be too very difficult to characterize what the software is doing, given that I have almost two weeks to study and write a bit of code if needed before the target software is in my hands. I'm even happy to open my own analytics account with GameSparks, drop in my credentials instead of those of the fun pimps, send all the data to a container I pay for (for a single play session, might be affordable... haven't looked at price list yet) and just read it. I don't know, is the point. But I have an interest in pursuing the project, so I'll just do so and share what I learn.
In the meantime, while I am very open to suggestions, information, pointers, whatever, I think the most valuable use of my time is to just do it, rather than talk about how I intend to do the thing I would be otherwise doing if I weren't talking about it. But I'll catch you all up once I have accomplished something, or determined that no such accomplishment is possible. :)
PS just to be clear, any information I obtain and present here will of course, unlike the panic brokers, be accompanied with detailed, step by step accounts of how I obtained the information, such that anyone with a little time could reproduce and check for themselves.
I wasn't debating the feasibility of it. I do this sort of stuff for games all the time. I was letting you know how to accomplish it , and letting you know what probably is a dead end (ip traffic analysis).
Please relax. I am not "challenging" anything. I'm not contesting anything. I already said I have only a passing familiarity with ip traffic analysis. I am basically just an educated layman at security. I am a computer professional, but my field is algorithms and coding theory, not security. Please please please relax and don't think of this as a competition. Please? :)
The thing motivating me to respond is that I do, in fact, check the security behavior of most games that I run regularly. You basically posted about something I do, and have an interest in. For example, I could give you information on what EAC does in your machine. :) You asked about someone else who could independently work on this in parallel. But then get defensive and testy at a person who can, and ask why they are even responding?
My advice for the first step, if you were new at this, which you aren't, but if you were - don't bother with IP traffic analysis. Use some basic tools to watch what machine resources are touched by the process of interest. Files handles, spawned threads, etc. This will tell you much more about what a process is doing in your machine than looking at a stack trace would. The stack trace won't be very helpful unless you have symbols for the processes involved .
Okay in your OP you were asking about other people to work together in parallel. And you also wanted to open up a discussion. Now you don't want to discuss it, and apparently don't want someone who knows a thing or two to help in parallel.
Would you please sit back, take a deep breath, and not feel threatened that I know a tiny bit about desktop security?
Excellent, more people should do that! And yes, on the ip side it isn't a good place to work on it. Which is why I never talked about IP in my OP. Before going out over the network, the data shuffles around in memory. That is also part of the "traffic" as it were, getting from 7dtd.exe to whatever the endpoint is at GameSparks.
Request(s) granted with enthusiasm. I am not unrelaxed, and I sincerely appreciate that you want me to be relaxed. :) I wish the same for you. <3
I am not currently a computer professional, but I was for many years, and my speciality was security. Reverse engineering malware is a specialized sub-topic that, while I've never really gotten too deeply into, was an area of expertise for many of my friends and peers, and I picked up a few tricks by osmosis.
I am sorry if you thought that I was defensive or testy. My internet-writing-tone can sometimes come off that way, but I think it is just because I use more words than most people, because I hate not being precise. And, I think for some people, they go on more at length when angry or upset, whereas for me I just try to be super super clear so nobody could possibly take the wrong literal meaning from my words. But then people read between the lines, and there are too many lines to read between, and they suspect there must be more emotion behind all that text than there really is. Or at least that's the story in my head. :)
Well said.
I think this may be the root of our misunderstanding. When I said "in parallel with whomever else decides to independently do it", what I meant was "You may wish to do something like this yourself all alone, then afterwards we can compare notes!"
It was, unfortunately, not an offer to collaborate because, while collaboration is something I need more of in my life, I'm not currently able to show up with any reliability in a team setting. Right now I just have to do my own thing.
I once again apologize that I made you think I felt that way.
Cheers then. Glad we came to a better understanding.
I will, indeed, quite certainly be making my own observations about what sparky does. Because this is one of the most played games in my gaming history. I go to bed with this game on pause. So if it is doing something questionable, I will want to find it. Plus...I enjoy security as a hobby.
Good luck in your investigations. I hope we find nothing questionable, because I hope it is doing nothing questionable.
1. It will cause the game to be balanced towards 1 or 2 game play styles only, leaving all other's out in the cold.
2. It won't be accurate because of the RNG factor where some people get way to much of something, where other's never get it, or rarely see it.