VRChat added VRCA (?maybe VRCW too) protection
-
Hey, why don't we go back to what the first rippers did?
i.e. use second life to make an avatar there and rip it and port it to unity and then to vrchat ?
i really feel that we have to go back to that
or look for a new method to bypass the aes encryption. -
this is all that its know atm:
some people got around it
you have to modify the client
the file responsible for the encryption might be "vrc_fast_crypto.dll" in the plugins folder.
dm me for further info@dobyp
There is waiting for a modified DLL file to replace it, but unlikely we can do by self except expert of decompiled/reverse field who masters assembly code.
I have a little bit of disassembly relevant knowledge, as far as I know, I used to do what about using dll patch to bypass the protection of Genshin Impact so that you can do smth like injecting cheats or allowing modified clients to connect to the private game server.
I don’t know whether they have some common ‘cause GI needs like ll2CppDumer to get dll file info then gets them into some reverse analysis software like IDA Pro, the remaining thing I have no idea about them.
So ugh the basic idea is probably that replacing dll file to make encryption doesn’t work. -
Someone in the ARC discord said this "the fast_crypto.dll does nothing but work for udon and p2p encryption" I suspect this isn't related or the file at least is not responsible for the encryption.
-
@LeonKennedy that is such a interesting info
there is new file whenever you open the cache-windows, called vrc-version, i not sure what it is, back then it was not a thing, maybe they are used for decryption? Like sort of authetication
New or old file appear in plugin folder called mediapipe_c and lib_burst_generated, how do i check dll?
-
i've reversed the dll myself, and it's in fact not related to the avatar encryption, but it's known that everything happens on memory.
If you know about reverse engineering we could create a discord group to help each other, if you are interested dm me.
-
Touching the client is resource intensive. I believe that going around it by bumping TLS or getting bundles from the CDN is our best bet yet.
-
there is multiple people who have a working method i dont know it myself but i would like the eac bypass because i could probably make a melon loader mod to do it
-
I may be wrong (I don't think so though) but I just ripped an avatar just fine I know that with the newest sdk 3.8 or something they have detections for ripped avis so if you import an avatar it's got to be renamed and all folders need to be moved and renamed to trick it into thinking it's normal. It really pissed me off but it doesn't seem to be impossible, took me a bit but def. doable.
I wasn't able to rip with UTiny like the old days but I have an old bit of software that for my continued use will not be naming but FYI I believe you can. -
Can I ask where you heard about the ripping detections for sdk 3.8? If this is true, that is very frustrating
-
I don't know much about the ripping detection, but recently I ran into a public avatar that in their radial wheel they had a toggle which stated "I know when you rip this avatar" and in the description it outed 2-3 people that have before. But that's as far as I've heard about it
-
I don't know much about the ripping detection, but recently I ran into a public avatar that in their radial wheel they had a toggle which stated "I know when you rip this avatar" and in the description it outed 2-3 people that have before. But that's as far as I've heard about it
@mrblueskelly That sounds more like the original creator found the ripped versions, could be a user thats part of a small community/fandom that got told about their model getting ripped or the people who ripped the model making their versions public since thats what i generally see happen