09-03-2007, 04:23 PM
Problem with that is it only obfuscates you from reading what it is. Lets say you have a movement packet:
ASDF1
And you encrypt it:
1XZ>:
Every time, it still will appear:
1XZ>:
So encryption with a constant key hardly stops any hackers except for making it harder to figure out what it does.
For packet spoofing, you can tell the server any packet you want at any speed you want, which is why you have to have server-side checks for every request the client can make.
ASDF1
And you encrypt it:
1XZ>:
Every time, it still will appear:
1XZ>:
So encryption with a constant key hardly stops any hackers except for making it harder to figure out what it does.
For packet spoofing, you can tell the server any packet you want at any speed you want, which is why you have to have server-side checks for every request the client can make.