In that case, as the prizes are large and the audience will include hackers,
I'd go with a combination. Here's a few ideas off the top of my head, some
of them may be stupid, others too expensive to implement depending on your
prize money / risk of actual damages to your company if it gets hacked (ie
if you get sued or look like douchebags, as well as paying some hacker the
prize).

Start with SSH

Turn off crossdomain.xml :)

Perhaps include something along the lines of an embedded signed java Applet
to verify an MD5 of the .swf file

Only bother with the encryption if it's within a certain distance of high
score, to cut down on server load

Have the SWF download the decryption module (perhaps using a unique url it
gets from the signed java applet, just to make it slightly harder to
simulate the Flash environment) when needed and timeout - as mentioned
already

Maybe generate a new encryption algorithm SWF every time - could be server
expensive, as well as a programmatic challenge

Maintain a pool of encryptor-decrypter pairs (cryptdecs?), choose one at
random instead of a new one every time. But still have either people or
software coming up with new ones and retiring old ones.

Depending on the game, include in your "high score" packet some information
that would be able to let a server-side simulation give you some sort of
"chances of actually getting this score from these starting conditions and
log of commands" score

Statistical analysis of the score history of the userbase as a whole, users
in the top 80-90ish percentile, and compare it to the winner

Anybody else have any ideas to throw in? Or better yet find a flaw in mine?
This is definitely an interesting topic!

-J

Before you do anything funky, download the current high score - if the app
doesn't think the user has beaten it

On Wed, May 28, 2008 at 4:26 AM, kenny14390 <[EMAIL PROTECTED]> wrote:

>   > > There is no such thing as Flash application security?
> >
> > Against what ?
> > How much is the value of the prize ?
> > Who is attacking you ? Why ?
>
> The prizes are pretty big, so there is a justified concern for
> security. The "attackers" would be facebook users, so they will
> usually be 18-25.
>
> --- In [email protected] <flexcoders%40yahoogroups.com>, Tom
> Chiverton <[EMAIL PROTECTED]>
> wrote:
>
> >
> > On Tuesday 27 May 2008, kenny14390 wrote:
> > > Is the simple conclusion that Flash applications are inherently
> > > transparent?
> >
> > Yes, same as a HTML application, in a sense. This is the bane of
> client/server
> > computing, and *banks* haven't cracked it yet either.
> > However, there are less people with the skills to decompile a Flex
> app than a
> > JavaScript one. But maybe all they need to do is sniff the network
> traffic...
> >
> > > Does SSL patch any of these risks?
> >
> > No, because the user can configure an SSL proxy and see the plain
> text of the
> > session. But, again, less people will be able to do this.
> >
> > > There is no such thing as Flash application security?
> >
> > Against what ?
> > How much is the value of the prize ?
> > Who is attacking you ? Why ?
> >
> > Until you answer those questions, how can you evaluate any of the
> various
> > mitigation's ?
> > For instance, if your attackers are all under 10 (because your app
> is used in
> > a closed environment, i.e. a school class room, and the login is
> tied to the
> > attendance list and O/S logged in user) then you probably don't need
> to do
> > anything else.
> >
> > > How can a "high score" problem be overcome?
> >
> > Some sort of CAPTCHA type test should prove there is a user sat at the
> > computer, but I'm not aware of anyway to verify they're using your
> client and
> > not another one they built themselves.
> > Given they can intercept your 'calculateChecksumOfYourself()' (or
> whatever)
> > and just send back the 'right' answer.
> >
> > A lot of the time, raising the bar fairly high (require login, SSL) is
> > probably good enough.
> > In your case, I'd probably want to require unique, verified email
> address too.
> > Maybe postal too as people tend to have fewer throw away postal
> address' that
> > actually work :-)
> >
> > --
> > Tom Chiverton
> >
> > ****************************************************
> >
> > This email is sent for and on behalf of Halliwells LLP.
> >
> > Halliwells LLP is a limited liability partnership registered in
> England and Wales under registered number OC307980 whose registered
> office address is at Halliwells LLP, 3 Hardman Square, Spinningfields,
> Manchester, M3 3EB. A list of members is available for inspection at
> the registered office. Any reference to a partner in relation to
> Halliwells LLP means a member of Halliwells LLP. Regulated by The
> Solicitors Regulation Authority.
> >
> > CONFIDENTIALITY
> >
> > This email is intended only for the use of the addressee named above
> and may be confidential or legally privileged. If you are not the
> addressee you must not read it and must not use any information
> contained in nor copy it nor inform any person other than Halliwells
> LLP or the addressee of its existence or contents. If you have
> received this email in error please delete it and notify Halliwells
> LLP IT Department on 0870 365 2500.
> >
> > For more information about Halliwells LLP visit www.halliwells.com.
> >
>
>  
>



-- 
"Therefore, send not to know For whom the bell tolls. It tolls for thee."

:: Josh 'G-Funk' McDonald
:: 0437 221 380 :: [EMAIL PROTECTED]

Reply via email to