Jump to content

Recommended Posts

  • Replies 4
  • Created
  • Last Reply

Top Posters In This Topic

Popular Days

Top Posters In This Topic

  • Premium

Most people virtualize it inside the binary.

But theres no reason to do it actually, as you can bypass that "protection" and extract all the eix in a few minutes.

 

There is however a new pack method creating only the epk files (eix doesnt exist). Still, very few people are using it and the ones who modded it to be secure wont give any information about it i bet.

The alternative you could do was to implement cython, change all the default keys of the client ofc and probably a file check in the bin to detect client alterations to your files.

Link to comment
Share on other sites

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now

Announcements



×
×
  • Create New...

Important Information

Terms of Use / Privacy Policy / Guidelines / We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.