Logo
    Search

    Adrian the Video Game Hacker and GDC 2023

    enMarch 31, 2023

    Podcast Summary

    • An Interview with a 20-Year Game Hacker: Ethics and BoundariesA 20-year game hacker, Adrian, discussed ethical dilemmas in game hacking and how he navigates these blurry lines. The host shared experiences from the Game Developers Conference and the importance of recharging.

      The world of video game development and hacking is vast and constantly evolving. During the Game Developers Conference 2023, the host had the opportunity to interview a professional video game hacker named Adrian, also known as Manfred, who has been in the business for over 20 years. Adrian shared insights into the changing ethical boundaries of game hacking and how he navigates these blurry lines. The host also shared his experiences from the conference and his backcountry skiing trip, highlighting the importance of stepping away from the hustle and bustle to recharge. Despite the conference's massive attendance of 20,000 people, the host was able to track down Adrian through research and networking. The host expressed gratitude to his Patreon supporters, including Zac, Danzar, Alan, Yee, Yohan, Nalish, Darren, Evan, Ryan, Jacob, and Rob, for their continued support of the show. The Discord community was also mentioned as a fun and engaging platform for fans to connect and engage with the podcast.

    • Emphasis on collaboration and talentCollaboration and having talented individuals are crucial for creating engaging content. Unexpected situations require adaptability and finding alternative solutions.

      During the discussion, the importance of collaboration and the presence of talented individuals was emphasized. The group produces music for their show and created a Discord channel called "Share Cool Stuff You Made" for others to contribute. The speakers at the Game Developers Conference shared a wide range of knowledge, from creating musical themes to hiding Easter eggs in music. An unexpected experience was shared about staying in an Airbnb when the host died before their arrival, leaving them to find alternative accommodations during a conference with high demand for lodging. The speakers also touched on the concept of supply and demand in the hospitality industry, comparing it to surge pricing in Uber and the airline industry. Overall, the conversation highlighted the value of collaboration, talent, and adaptability, especially in unexpected situations.

    • The Unusual Blend of Innovation and Marketing at GDCCryptocurrency companies conduct virtual calls, startup founders live unconventionally, but GDC provides valuable insights and opportunities.

      The tech industry, specifically during events like the Game Developers Conference (GDC), can be a strange blend of innovation and intense marketing efforts. At GDC, brands, especially those in emerging markets like metaverse, web 3, and crypto, try to sell their products to a skeptical audience. This tension can lead to unusual situations, such as a cryptocurrency company conducting a Zoom call with a live audience instead of physically attending an event. Meanwhile, some individuals in the tech scene live unconventional lifestyles, like a startup founder living in a van and joining a crypto-focused commune. Despite these oddities, the conference itself offers valuable insights and opportunities for learning and networking.

    • The intersection of technology and culture at gaming conferenceThe gaming conference showcased the strange and innovative developments at the intersection of technology and culture, including a DAO-governed van commune and crypto's impact on industries like gaming and tech. Passionate creatives and poignant moments added to the unique experience.

      The intersection of technology and culture, as exemplified by events like the gaming conference discussed, yields both strange and innovative developments. At this particular event, there was a van commune governed by a DAO, where people could live and potentially use peyote, but it was marketed like a millennial meal prep kit startup. Crypto mining has significantly impacted industries like gaming and technology, with NVIDIA's profits largely driven by crypto miners. However, the NVIDIA CEO recently expressed skepticism towards crypto's utility and instead emphasized AI as the future. Despite the weird aspects, the games industry is filled with passionate, creative individuals, making events like these a unique and worthwhile experience. The passing of Gordon Moore, the father of Moore's Law, added a poignant note to the technological advancements showcased. Overall, the event highlighted the ongoing evolution of technology and culture, with both their strange and exciting aspects.

    • A Hacker's Insights into Game Cheating: History, Monetization, and Digital ScarcityA hacker with 20 years of experience in game cheating shares insights on the history, monetization methods, and digital scarcity concepts in gaming, emphasizing the importance of understanding these evolving aspects for developers.

      Adrian Bednaric, a video game hacker known as Manfred, has spent the last 20 years exploiting online games and has valuable insights to share with current and upcoming developers about common and advanced techniques used to hack games. His experience sheds light on the shadowy world of online game hacking, the threat actors involved, and the tools they use. Adrian's talk at a recent event covered the history of Wild West games cheating, the changing monetization methods in games, and the concept of digital scarcity. He believes that the future of games might look less like a store and more like a government taxing transactions between players. Ultimately, Adrian's work highlights the importance of understanding the implications of digital scarcity and the evolving nature of game monetization.

    • Story of a Gamer who Exploited Illusion of Scarcity in Early MMORPGsUnderstanding game mechanics and exploiting them can give players an unfair advantage, but it may lead to consequences and raise ethical concerns.

      In the early days of multiplayer online gaming, such as in Ultima Online, players could lose all their in-game possessions if they were killed by another player. The speaker, Manfred, recounted how he was renamed by a game master due to his excessive PVP activities and looting of other players' corpses. He also shared his experience of discovering exploits in the game, including one that allowed him to take control of another player's house. This incident showcased the illusion of scarcity in the game, as the scarcity of items, currencies, and housing was a designed aspect to make the game more engaging. However, Manfred's actions demonstrated that this scarcity was just an illusion, as he was able to manipulate the system to obtain more resources. This experience sparked Manfred's interest in the security aspects of online gaming and led him to explore the client-server architecture and find more exploits. Ultimately, the speaker's story highlights the importance of understanding the underlying systems and mechanics of online games and the potential consequences of exploiting them.

    • Creativity and resourcefulness in unexpected placesCreativity and resourcefulness can lead to unique opportunities and unexpected outcomes, whether it's creating a solution for a personal loss or exploiting features in an old online game for profit. Trust and communication are essential in transactions.

      Creativity and resourcefulness can lead to unique opportunities and unexpected outcomes, even in unexpected places like online games. Daniel, the founder of Pretty Litter, shared his experience of losing his cat and creating a solution to help detect early signs of illness in cats through a health monitoring litter. Meanwhile, a podcast listener shared his story of exploiting features in an old online game, Ultima Online, to make a significant profit. Daniel discovered that he could demolish other players' houses and place his own in their place, but felt guilty about it. Instead, he used his skills to create bots that placed houses when other players' houses were about to be demolished. He even listed a castle he had acquired in the game on eBay and sold it for a substantial amount of money. The buyer, however, required a trustworthy exchange, leading to a complicated negotiation and the use of an escrow service. These stories illustrate the potential for innovation and profit in unexpected places, as well as the importance of trust and communication in transactions. Daniel's creation of Pretty Litter is a testament to turning a personal loss into a solution for others, while the podcast listener's experience in Ultima Online showcases the possibilities of exploiting game features for personal gain. Overall, these stories demonstrate the power of creativity, resourcefulness, and determination in achieving unique outcomes.

    • Earning Income through Virtual Goods in Online GamesThe speaker's experience of selling virtual goods in Ultima Online and other games for over 20 years highlights the opportunity for income generation in virtual economies, even without the direct involvement of game companies.

      The speaker, who started selling virtual goods in the online game Ultima Online during his college days, was able to generate significant income through this unconventional means. He filled an unmet demand as the game companies weren't selling these items directly to players. The speaker continued this practice for about 20 years, making it his main source of income from 1997 to 2017. He used his real name and a VPN while signing up for accounts, but there were no significant efforts from game companies to monitor or prevent real money transactions. The speaker also mentioned having several exploits in various games, some of which lasted for years before being discovered. After Ultima Online, he moved on to Anarchy Online and another game called The Matrix Online, where he found exploits and continued his operation. Overall, the speaker's experience showcases the potential for earning income in the virtual economies of online games, even without the involvement of the game companies.

    • Exploiting Online Games for Personal Gain: A 13-Year JourneyThe speaker gained an unfair advantage in online games for 13 years, transferring items and gold between accounts, and reloading old character states, while staying ethical by not negatively impacting companies.

      The speaker used his technical skills to exploit login and logout workflows in online games to gain an unfair advantage, allowing him to transfer items and gold between accounts and reload old character states. He did this for 13 years, sometimes crossing ethical red lines but never intending to harm the game's profit or reputation. In another instance, he used hacking to gain admin-like powers in Shadowbane, causing chaos and entertaining players. Throughout his career, he stayed stealthy, targeting games that didn't provide virtual currencies or items directly to players, and selling these items for profit. He considered his actions ethical as long as he didn't negatively impact the companies. However, he eventually retired from hacking when the demand for exploits in certain games declined.

    • Exploring unintended marketplaces and selling unauthorized products in online gamesConsidering ethical implications and potential consequences is crucial when offered lucrative opportunities or discovering exploits in online gaming industry.

      Creating or exploiting unintended marketplaces or selling unauthorized products in online games can lead to ethical dilemmas, legal issues, and negative consequences. The speaker shares an experience where he was offered a lucrative opportunity to sell FIFA Ultimate tokens but decided against it due to ethical concerns and the potential risks involved. He also mentions an instance where he used an exploit to eliminate gold farmers in Final Fantasy 11, improving the player experience. However, he warns against exploiting systems in a way that could be considered insidious or malicious, such as intentionally obfuscating exploits or exploiting them for personal gain after discovering them as a developer. Overall, the speaker emphasizes the importance of considering the ethical implications and potential consequences of one's actions in the gaming industry.

    • Exploitable Bugs in Video GamesVideo games can contain exploitable bugs, leading to unfair advantages, teleportation, or even item spawning. Common bugs include integer overflows, underflows, and data race conditions. These exploits can go unnoticed for years, even after patches or updates.

      Video games, especially older ones, contain exploitable bugs that can be exploited for various reasons, such as gaining an unfair advantage, teleporting to other players, or even spawning items out of thin air. The most common types of bugs are integer overflows or underflows, where money values roll over to maximum or minimum values, and data race conditions, where actions are processed in a sequential manner, allowing players to exploit the system. For instance, a player could sell two of a single item and receive profits for selling one item, or even teleport to any player in the game by manipulating packet numbers. Some games even contained debug commands that were accidentally left in the codebase, allowing players to teleport, snoop on others' chat history, or spawn items. These exploits could go unnoticed for a long time, even after the release of patches or updates. For example, Final Fantasy 11 had about 5 to 10 exploits, mostly related to integer overflows, that went unnoticed for years until the release of Final Fantasy 14, which used the same codebase but had fixed these exploits.

    • Exploiting Old Video Game VulnerabilitiesOld video game codebases, some decades old, continue to have vulnerabilities exploited. Regularly updating and securing codebases is crucial to prevent such exploits.

      The exploitation of vulnerabilities in older video game codebases, some of which were decades old, has been a consistent theme throughout the history of online gaming. This was exemplified by the speaker's experiences with games like Final Fantasy 11 and Dark Age of Camelot, where exploits discovered years ago still worked in more recent versions. This highlights the importance of regularly updating and securing codebases to prevent such exploits. Another interesting topic that emerged was the evolution of the secondary marketplace for digital assets, such as in-game currency and items. It started with peer-to-peer sales on platforms like eBay but was eventually banned due to security concerns. This led to the rise of specialized marketplaces like EGPAL and IGE, which acted as intermediaries for buying and selling digital goods. The speaker's business model involved supplying these marketplaces with large quantities of in-game currency in exchange for payment. The speaker also touched on the current controversy surrounding NFTs and Web 3, with some seeing it as a way to promote player ownership and control of assets, while others view it as a passing trend. Regardless of one's stance, it's clear that the landscape for digital assets has come a long way since the early days of online gaming and continues to evolve.

    • Player-to-player transactions are the future of gaming monetizationThe future of gaming monetization is shifting towards player-controlled transactions, facilitated by Web 3 technologies and server-side systems, with challenges including taxation and insurance for virtual items.

      The future of gaming monetization is shifting towards player-to-player transactions, driven by the Web 3 ethos and the recognition of the vast economies that exist among players. This trend is leading to a symbiotic relationship between game revenue and player control. While blockchain technology plays a role in this cultural shift, player ownership and control of assets can also be facilitated server-side. The emerging industry around in-game assets is complex and presents many challenges, including the potential for taxable events and insurance for virtual items. The long-term future will likely involve a blend of Web 3 technologies and Web 2 centralization. Ultimately, players will have control over their assets, but the specifics of how this will be achieved and regulated are still uncertain. The permanence of items on the blockchain, while a benefit in terms of ownership, also presents challenges with no refunds or reversals of fraudulent transactions.

    • The illusion of scarcity in digital assets on the blockchainWhile the belief in scarcity fuels investment and innovation, it's essential to address concerns regarding scams and victim shaming in the Web 3 community, ensuring user education and protection.

      While the illusion of scarcity and ownership in digital assets on the blockchain is an intriguing concept, it's essential to remember that it's an illusion. The value of these assets lies in the human belief and acceptance of their scarcity. However, this illusion fuels investment and innovation in the space. On the other hand, there's a growing concern regarding the prevalence of scams and victim shaming in the Web 3 community. It's crucial to acknowledge that technology, no matter how advanced, is not infallible, and users must be educated and protected. The debate around the true value and impact of Web 3 and NFTs continues, with valid concerns regarding scams and victim shaming coexisting with the promising advancements in ownership and player interaction in various industries, including video games.

    • Manipulating Systems for Digital Assets: Parallels between Hacking Video Games and Web 3 TechnologyBoth hacking video games and Web 3 technology involve manipulating systems to access valuable digital assets, but the responsibility of ownership and security shifts from the developer to the end user in Web 3.

      The concepts of hacking and digital ownership, as discussed in the context of video games and Web 3 technology, share some intriguing parallels. The speaker, who once hacked video games for profit, noted that in both cases, the focus is on manipulating systems to gain access to valuable digital assets. However, while video game hacking was a purely technical endeavor, Web 3 technology places the responsibility of ownership and security on the end user. The speaker also shared his experience of transitioning from anonymity to public identity and the positive reception he received from the tech community. Furthermore, he emphasized the importance of understanding the inner workings of software and systems, whether it's for the purpose of hacking or programming. This common experience of curiosity and exploration is a powerful driver for many individuals in the tech industry.

    • Exploring Games for Deeper Tech UnderstandingExploring games through reverse engineering leads to a deeper understanding of technical concepts and can open doors to exciting careers in the tech industry.

      Games serve as an interactive and engaging way to learn about various technical concepts, including programming, security, and operating systems. By taking games apart, individuals can gain instant gratification and a deeper understanding of how these systems work. This process, often referred to as "reverse engineering," can lead to exciting discoveries and even careers in the tech industry. Whether it's decrypting save files in single-player games or interacting with APIs in online games, the skills gained from this hobby can be invaluable. As one speaker shared, their interest in taking apart games as a child on a Commodore 64 ultimately led them to a 20-year career in hacking video games professionally. The line between taking things apart and making new things gets blurry, and the fun and learning never stop.

    • Securing Gaming Industry: Digital, Physical, and Insider ThreatsFollow established security standards, test for specific vulnerabilities, secure digital and physical systems, and mitigate insider threats to ensure robust security in the gaming industry

      Creating robust security standards for the gaming industry is a complex process that requires constant vigilance against various attack factors. The speaker, with experience in hacking games and later consulting for major companies, emphasizes the importance of securing both digital and physical systems, as well as mitigating insider threats. He stresses that there's no silver bullet for security and that following established standards and testing for specific vulnerabilities is crucial. With the rise of web 3 games and the potential for players to truly own their assets, insider threats are expected to become even more significant. The process of securing games is ongoing and not a one-time task.

    Recent Episodes from Hacked

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird

    North Korean IT Scam + TikTok Zero Day + Consumer AI Gets Weird
    We discuss a bunch of stories, including the bizarre tale of how an anonymous business registration company let a massive IT scam unfold in the US, a TikTok zero day, Microsoft recall and Apple Private Cloud Compute, and a home-brew cell tower hack in the UK. NOTE: I (JB) misspeak at about 18 minutes in. I say "US" when we're talking about the UK. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 16, 2024

    Hotline Hacked Vol. 3

    Hotline Hacked Vol. 3
    It's our third call in episode and we're cooking now. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss accidentally causing internet outages, creating a botnet pandoras box, and the proud tradition of hacking into stuff to play great songs the man does't want you to. Learn more about your ad choices. Visit podcastchoices.com/adchoices
    Hacked
    enJune 02, 2024

    Hotline Hacked Vol. 2

    Hotline Hacked Vol. 2
    It’s our second call in show episode. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss hacking e-bike networks, an act of white hat kindness, an 1970's hack from the prairies, and how bots have turned everyone into a commodities trader. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The iSoon Leaks

    The iSoon Leaks
    A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substack.com/ Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Gaming Chat Vol. 1

    Gaming Chat Vol. 1
    Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Real World

    The Real World
    The story of an online business school and the ex-student warning that it might be a cult. Check out some of our guest Tim Hume’s excellent reporting at the links below: https://www.vice.com/en/article/pkaw7k/andrew-tate-the-real-world-cult https://www.vice.com/en/article/n7emvg/andrew-tate-channels-culled-by-youtube-after-revelations-about-get-rich-quick-cult https://www.vice.com/en/article/4a385g/youtube-profited-from-andrew-tate-recruitment-videos-despite-banning-them Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Pokédex

    The Pokédex
    A lot of the tech we use today started out as a gizmo in a piece of science fiction. A conversation with Abe Haskins, creator of the DIY Pokédex, about how the sci-fi we love informs the tech we get, and how he hacked together an iconic piece of 90’s pop culture. Check out his excellent work at https://www.youtube.com/@abetoday Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Pretend: The Stalker - Part 1

    Pretend: The Stalker - Part 1
    Two competing stories about a cyberstalking that all comes down to an IP address. Today's episode was a partnership with "Pretend," hosted by Javier Leiva. Pretend is a true crime podcast about con artists. Definitely check it out wherever you get your shows. Spotify: https://open.spotify.com/show/2vaCjR7UvlN9aTIzW6kNCo Apple: https://podcasts.apple.com/ca/podcast/pretend-a-true-crime-podcast-about-con-artists/id1245307962 RSS: Click here Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    WEF Head Creeps Out Crowd by Describing His Weird Future Fantasy | Direct Message | Rubin Report

    WEF Head Creeps Out Crowd by Describing His Weird Future Fantasy | Direct Message | Rubin Report
    Dave Rubin of “The Rubin Report” talks about the latest craziness out of the World Economic Forum; Klaus Schwab sharing his creepy fantasy of everyone getting brain chips and brain implants; Tony Blair discussing the digital infrastructure being planned to put a global vaccine passport in place; and FBI Director Christopher Wray revealing the deep level of collusion between the public and private sectors. Dave also does a special “ask me anything” question-and-answer session on a wide-ranging host of topics, answering questions from the Rubin Report Locals community. WATCH the MEMBER-EXCLUSIVE segment of the show here: https://rubinreport.locals.com/ Learn more about your ad choices. Visit megaphone.fm/adchoices

    Sneak Peek of EP 2: Dan Brunette Navigating Ethics

    Sneak Peek of EP 2: Dan Brunette Navigating Ethics

    A sneak peek at Episode 2, ladies and gentlemen! Extremely excited to share with you a little about what you can expect from our interview with Dan Burnette! 

    Daniel Brunette is the Director, Development and Donor Services for the Ottawa Community Foundation. During the past 17 years, he has worked and volunteered in a number of different capacities in the not-for-profit sector. As a volunteer, Daniel has spoken extensively about fundraising. In 2015, he was recognized with a Community Builder Award from United Way Ottawa for his sector involvement and capacity-building work.

    Your best course of action is to cheat and put your name on every paper

    Your best course of action is to cheat and put your name on every paper
    One of the biggest cases of academic misconduct in recent times has been the case involving Francesca Gino, Dan Ariely, and Max Bazerman. Is there anything we can learn from this case and how it was handled? Nick and Jan are back from the winter break and dig straight into questionable research practices, whistleblowers, senior co-authors and what we as a field should be doing to prevent fraud to undermine our research contributions. As usual, the references to readings we mention are listed on .