IIRC, at day 1, UE was paid only. This is probably the main reason unity is more popular today. I think that, after seeing unity success, UE started changing its ways.It was left behind by UE since day 1 tho
Last edited:
IIRC, at day 1, UE was paid only. This is probably the main reason unity is more popular today. I think that, after seeing unity success, UE started changing its ways.It was left behind by UE since day 1 tho
And if, for whatever reason, a corrupted version is uploaded, it will not stay long ; the community is really reactive when it come to this issue. I've seen it happen twice, perhaps three times, in five years, and really every time the links were removed in less than one hour.[...] and all games are tested before being uploaded.
If anyone is that paranoid, they could run porn games (or any software which might be remotely sus) in a VM.And if, for whatever reason, a corrupted version is uploaded, it will not stay long ; the community is really reactive when it come to this issue. I've seen it happen twice, perhaps three times, in five years, and really every time the links were removed in less than one hour.
Add to this one's own anti-virus plus, like you said, TotalVirus, and also one's firewall/IP filter. What more could one ask for ?
Even if I was trusting myself enough to catch a malware subtly hidden in it, I'll not review the source code, then compile it, every single time I download an adult game. And I doubt that anyone would do it.
If the exploit works, then the target deserve to have been compromised.One of the earliest things I learned about attacking systems was how to modify software using an already known exploit and executing that on a target machine.
I wonder. If anyone is that paranoid, why is he on a pirate forum "full" of ads ? It's a well known fact that nowadays ads are used to spreads malware. Most ransomware are spread that way ; you look an innocent flash advertisement, and the second after your computer is locked.If anyone is that paranoid, they could run porn games (or any software which might be remotely sus) in a VM.
This being said, there's an incoherence in your logic. If VirusTotal do not detect it anymore, it mean that it disappeared from all anti-virus database. Therefore, you don't need to make a single change in the exploit, using the original is enough.
Except that, if the exploit is still usable on your target, it mean that its user/admin don't care to keep things up to date... what include the database of its anti-virus. What mean that you can't be sure that you'll not be detected and stopped.
And finally, if your alteration is enough to make it not detected by its not updated anti-virus, then you don't need to wait for the original to disappear from the databases.
You aren't dumb, you are (still) short in knowledge regarding this topic, what is different.Edit: I'm dumb, I still think the same concepts apply even in malware written for mass distribution but I dont know enough about writing it in general
Use an anti-virus, keep it up to date, and never forget that you aren't and will never be protected at 100%. And you'll be safe, perhaps even all your life.
Oh my good, this is so true...You must be registered to see the links
For anyone interested, "right click>run in a sandbox" is all you need to do if you have a software like sandboxie plus. (I always do that when virustotal gets some hits)If anyone is that paranoid, they could run porn games (or any software which might be remotely sus) in a VM.
I crossed it out because I reread your post and realized ive never been a malicious actor and was only ever learning on targets and in labs that were intentionally made to train pentesters. I'm not a malware analyst and im not knowledgable compared to most of the people I've met, I was just assuming that writing malware is similar to a little of what I had done in the past which isnt true. Writing malware to hit a large number of people is different.The link you gave don't really address the point you made, but it, with what you crossed out, permit me to understand what you wanted to say. And you aren't wrong, but aren't right either
lol I used to tell people if they dont want to get caught that they need to buy a bow, and learn to hunt since theyll be living in south sudan if they really need to evade the lawElse, you end with a military grade security, and it's just not bearable.
Less dated than mine. I know a bit more than you because it have been my job ; strangely you learn faster and remember better when you've to secure even just three/four real computers, with real data and users. But in the same time I quitted this field more or less 10 years ago.Its been like 2 years since and I've given up on finding a career in security so my knowledge is dated.
That it works is secondary, as well as the fact that you globally did what you was told to do. You acquired knowledge that not enough people working with computers know. Hell, don't remember the name, but a HiTech company selling cameras for video conferences have been caught recently with a big flaw in their security ; you don't need to enter the admin password to turn off the need to authenticate before you access the settings.I've never written anything security related that used raw shellcode without my hand being held. The stuff I did do, I know doesnt work practically because AV uses a mini vm like thing to execute, test code, and it will usually flag it the moment that happens regardless of what that code does.
IronSource never created any malware. It made an installer tool that some people (not affiliated with IronSource) used to create malware. To claim this as providing malware is similar to saying that Renpy is distributing malware because some people decided to inject a virus into their Renpy game, which of course is an absurd statement.I doubt you have to worry about malware in Unity now because of this merge. IronSource is also not in this malware business nowdays. It’s about in-game Ads on Mobile Games or something. And if they would lie and actually do something fishy, this would pretty much just be nothing else then a self destruct operation. This survey seems misleading.
Well, let’s say making a tool which “ninja installs” additional software isn’t exactly ethical either. It’s pretty much calling for abuse. IronSource probably hasn’t created any malware themself but I would not let them out the hook by saying they haven’t done any business with it. But again, it’s a thing of the past and spreading misinformation harms the game-devs first before it start to harm Unity.IronSource never created any malware. It made an installer tool that some people (not affiliated with IronSource) used to create malware. To claim this as providing malware is similar to saying that Renpy is distributing malware because some people decided to inject a virus into their Renpy game, which of course is an absurd statement.
I think the whole problem was that this happened a short time after the wave of layoffs, where people were already in Unity bashing mode. That malware headline is also a very effective clickbait, so the misinformation ran wild
information of the past true but they are still in the mobile info/spy game and lets face it if they had 0 intent of malware then why did ti take so long for those programs to get shut down?.Well, let’s say making a tool which “ninja installs” additional software isn’t exactly ethical either. It’s pretty much calling for abuse. IronSource probably hasn’t created any malware themself but I would not let them out the hook by saying they haven’t done any business with it. But again, it’s a thing of the past and spreading misinformation harms the game-devs first before it start to harm Unity.
Since the last decade, trucks have been used for terror attacks in some place around the world. Should the world stop selling and using them for this reason ? Or is it an unwanted side effect that wouldn't change if truck were definitively banned, while 99,99% of the time trucks are still used as intended ?information of the past true but they are still in the mobile info/spy game and lets face it if they had 0 intent of malware then why did ti take so long for those programs to get shut down?.
Since the last decade, trucks have been used for terror attacks in some place around the world. Should the world stop selling and using them for this reason ? Or is it an unwanted side effect that wouldn't change if truck were definitively banned, while 99,99% of the time trucks are still used as intended ?
It's exactly the same problem here. It's not because a software is sometimes used in a none intended way, that its publisher is responsible. They should have been more careful in the start, but once they released it, it was too late anyway. It's internet, it's not like you can't find a software that isn't officially published/sold anymore.
You understand that you're comparing two situations that can't be compared, right ?With software though old version with the abilty to create said malware would still be out there the original creator taking a stand and trying to rectify the issue is a big difference than standing around.
Like Ea with securerom eventually they created the uninstaller and removed that drm or the whole ps3 clock issue.
Nice example, there were actions against this kind of issue:Since the last decade, trucks have been used for terror attacks in some place around the world. Should the world stop selling and using them for this reason ? Or is it an unwanted side effect that wouldn't change if truck were definitively banned, while 99,99% of the time trucks are still used as intended ?
Well, in case of this specific company, there are sources that does not sustain this line of press. (Meaning: they were expecting it to work this way and hoped not get caught).The publisher is not responsible for the way third persons misuse their product.