LogoLogo
  • Welcome to Cyphor
  • .NET Code Obfuscation
    • Getting Started
    • How to Obfuscate
    • Basic Code Obfuscation
      • Symbol Renaming
      • Body Mutation
      • Control Flow
      • Constant Encryption
      • Call Hiding
      • Debug Protection
      • Integrity Checks
      • Self Healing
    • Advanced Obfuscation
      • Attribute-Based Obfuscation
      • Guide to obfuscation
      • Code Inlining
      • What is RASP?
      • Protections that protect each other
      • Program not working after obfuscation
      • Keeping performance with obfuscation
      • Virtualization
  • Dashboard
    • Files
    • Billing
      • Pay as you go
      • Examples
    • Projects
      • Code Guard Tasks
      • Permissions
        • Roles
      • Files
      • SAML and SSO
  • Code Guard
    • Introduction
    • Implement with your licensing system
      • Setting up a gateway
      • Setting up the SDK
    • Secured values
      • Dynamic values
      • Code Encryption
        • Page 1
    • Preventing analysis
    • Enhanced visibility
      • Disabling tracing on production
      • Logging external methods
      • Optimizing Memory Usage
    • Edge connectivity
    • Preventing modifications
      • Preventing assembly load
      • Allowing partial tampering
      • Enterprise EDRs and XDRs
      • Dynamic Hook protection
      • Thread hijacking
      • Guard Checksums
      • DLL Injection
      • Handling complex RE attacks
        • Custom payload detection
    • Granular Integrity Checks
    • Virtualized Environments
    • Troubleshooting
    • Threat database
    • Real time alerts
      • Alert Insights
  • CLI Tool
    • Introduction
    • Global options
    • Profiles
    • Projects
    • Obfuscator
      • Obfuscation Schemes
      • Task templates
      • Protecting files
        • Global obfuscation flags
        • Using templates to obfuscate files
        • Quick obfuscation
      • Monitoring obfuscation jobs
    • Securing local storage
Powered by GitBook
On this page
  • Drawbacks
  • Allowing tampering on a class

Was this helpful?

  1. Code Guard
  2. Preventing modifications

Allowing partial tampering

In some scenarios, it may make sense to allow dynamic tampering on an application, such as in the case of games that want to allow their community to intercept and modify certain parts of the application.

Drawbacks

By opening up the application to tampering, you may be exposing it to security threats that could compromise the integrity and stability of the program.

Additionally, allowing tampering can also make it more difficult to enforce rules and regulations within the game, as players may be able to bypass or circumvent certain limitations or restrictions.

it is important to clearly communicate the rules and regulations surrounding tampering to your community, and provide guidance and support for players who want to modify the application in a safe and responsible manner.

By taking these steps, you can ensure that your application remains secure and stable, while still allowing for the benefits of dynamic tampering to be enjoyed by your community.

Allowing tampering on a class

[CyphorSDK.AllowDynamicTampering]
public class PlayerData {
 ...
}

PreviousPreventing assembly loadNextEnterprise EDRs and XDRs

Last updated 1 year ago

Was this helpful?