Hi, been doing some work with gamesparks. I'm creating a client side game where I wanted to store data/coms using the gamesparks API. (as its so good). Was thinking how hard it is to hack with a downloaded client. I see it as just modifying the client code and then having full access to everything.
Whats stopping that from happening?
Best Answer
C
Customer Support
said
over 8 years ago
There are a couple of layers of security to help prevent this from happening. Firstly, the client side would need to know the specific API Secret and Key to connect to your specific game instance set up on the backend. Secondly, the connections are encrypted hiding those keys from a potential hacker.
There are a couple of layers of security to help prevent this from happening. Firstly, the client side would need to know the specific API Secret and Key to connect to your specific game instance set up on the backend. Secondly, the connections are encrypted hiding those keys from a potential hacker.
John Robinson
Hi, been doing some work with gamesparks. I'm creating a client side game where I wanted to store data/coms using the gamesparks API. (as its so good). Was thinking how hard it is to hack with a downloaded client. I see it as just modifying the client code and then having full access to everything.
Whats stopping that from happening?
There are a couple of layers of security to help prevent this from happening. Firstly, the client side would need to know the specific API Secret and Key to connect to your specific game instance set up on the backend. Secondly, the connections are encrypted hiding those keys from a potential hacker.
Is that what you are looking for?
Best,
John.
- Oldest First
- Popular
- Newest First
Sorted by Oldest FirstCustomer Support
There are a couple of layers of security to help prevent this from happening. Firstly, the client side would need to know the specific API Secret and Key to connect to your specific game instance set up on the backend. Secondly, the connections are encrypted hiding those keys from a potential hacker.
Is that what you are looking for?
Best,
John.
John Robinson
-
Documentation Notes
-
Design issues with user events
-
Using NoSQL
-
Runtime Collections vs Metadata Collections
-
Anonymous authentication from browser app
-
Modules
-
Movement With Unity
-
Problem with url parameters for downloadables
-
Querying NoSql GameSparks database
-
Challenge accesType
See all 2487 topics