Home Backend Development PHP Tutorial The struggle between PHP encryption and decryption

The struggle between PHP encryption and decryption

Dec 21, 2016 am 10:22 AM
encrypt and decode

However, the emergence of the PHP decompilation system quickly caused panic among Zend Company and even the entire PHP user group. Almost all large PHP products, including the above-mentioned products, have cracked versions and even complete source codes. As a result, Zend had to bow to Crackers, admitting that all encryption technologies have ways to crack it, and promised to improve encryption products to provide stronger protection.

PHP encryption technology can be traced back to 2001. PHP was already very popular at that time, so many companies hoped to launch commercial PHP systems, so PHP encryption (compilation) products came into being. Then PHP Jaw Zend Company launched its own Zend Encoder, until now, Zend's encryption products are still the leader in this field.

What about PHP decryption technology? A very strong decryption system appeared in early 2002. This system was actually developed by PHP core members. Until now, all PHP decryption technologies still rely on the technology released by PHP core members in 2002 for decryption. Moreover, there is currently no encryption product that can avoid being cracked by this technology. . (Considering the interests of the huge PHP developers, we will not disclose this technology here)

It is worth mentioning that the Chinese have once again shown their face in the field of cracking. At the end of 2005, a certain XX studio in China announced that it could restore Zend-encrypted PHP code and provided online testing services. There is nothing special about this, because in 2004, there were several similar teams abroad providing PHP cracking services. The difference is that XX Studio has a very tough style. It not only spreads its own advertisements through various channels, but even uses virtual identities to publish advertising messages on the Zend company's forum, which caused a sigh of relief in the PHP industry.

Recently, it was discovered among Google Blog users that a Chinese user provides PHP cracking services and also provides free decompilation testing services.

We have submitted the same compiled code to several well-known companies, including foreign veterans, domestic XX Studio, and the PHP cracking team that recently appeared on Google Blog. After comparing the cracked code, We found that all these cracking technologies are basically based on the same principle, but the old companies have stronger capabilities and the cracked code is closer to the source code, while the new technical team is obviously slightly less powerful.

Later we learned that there is actually only one XX studio in China that provides PHP cracking services. The user on the Google Blog is a Chinese member of an established foreign PHP cracking team, and he only appeared in the Chinese community in a low-key manner recently.

Similarly, we compared the cracking technology and service prices of various teams. Although the domestic XX Studio is far ahead in price, its cracking technology cannot be compared with those of the old teams. Some friends even called the XX Studio They have threatened their company: if they do not pay the "protection fee", their source code will be released. It's really a bit ridiculous. OPENLINK also has a large number of PHP products. Maybe one day the XX studio will charge protection fees.

In fact, OPENLINK has basically specialized in solutions. Users can obtain all the source code at once, so OPENLINK does not You need to pay attention to the problem of cracking, but for other brother companies, you should really consider the issue of intellectual property rights.

For more articles related to the struggle between PHP encryption and decryption, please pay attention to the PHP Chinese website!


Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Data encryption and decryption using React Query and database Data encryption and decryption using React Query and database Sep 26, 2023 pm 12:53 PM

Title: Data Encryption and Decryption Using ReactQuery and Database Introduction: This article will introduce how to use ReactQuery and database for data encryption and decryption. We will use ReactQuery as the data management library and combine it with the database to perform data encryption and decryption operations. By combining these two technologies, we can securely store and transmit sensitive data, and perform encryption and decryption operations when needed to ensure data security. Text: 1. ReactQue

Encryption and decryption implementation method developed in PHP in WeChat applet Encryption and decryption implementation method developed in PHP in WeChat applet Jun 01, 2023 am 08:12 AM

As WeChat mini programs become more popular in the mobile application market, their development has also received more and more attention. In small programs, PHP, as a commonly used back-end language, is often used to handle the encryption and decryption of sensitive data. This article will introduce how to use PHP to implement encryption and decryption in WeChat applet. 1. What are encryption and decryption? Encryption is the conversion of sensitive data into an unreadable form to ensure that the data is not stolen or tampered with during transmission. Decryption is the restoration of encrypted data to original data. In small programs, encryption and decryption usually include

Encrypt and decrypt sensitive data using Yii framework middleware Encrypt and decrypt sensitive data using Yii framework middleware Jul 28, 2023 pm 07:12 PM

Encrypting and decrypting sensitive data using Yii framework middleware Introduction: In modern Internet applications, privacy and data security are very important issues. To ensure that users' sensitive data is not accessible to unauthorized visitors, we need to encrypt this data. The Yii framework provides us with a simple and effective way to implement the functions of encrypting and decrypting sensitive data. In this article, we’ll cover how to achieve this using the Yii framework’s middleware. Introduction to Yii framework Yii framework is a high-performance PHP framework.

How to add Win11 encryption function to the right-click menu? How to add Win11 encryption and decryption right-click shortcut How to add Win11 encryption function to the right-click menu? How to add Win11 encryption and decryption right-click shortcut Jan 07, 2024 am 08:45 AM

This article is a tutorial on how to encrypt and decrypt files without using third-party encryption and decryption tools. A tutorial on adding encryption and decryption methods to the right-click menu of Win11. Since the registry needs to be modified, you must make a backup before proceeding. operate. 1. First, press the [Win+R] key combination on the keyboard to open Run, then enter the [regedit] command and press [OK or Enter] to open the Registry Editor; 2. In the User Account Control window, you need to allow Does this app make changes to your device? Click [Yes]; 3. Registry Editor window, expand to the following path: HKEY_CURRENT_USER\Software\Microsoft\Windows\Curr

Example of data encryption and decryption during PHP Tencent Cloud Server API interface docking process Example of data encryption and decryption during PHP Tencent Cloud Server API interface docking process Jul 06, 2023 am 10:52 AM

Introduction to data encryption and decryption examples in the process of docking with the API interface of Tencent Cloud Server using PHP: In the process of docking with the API interface of Tencent Cloud Server, the security of data is very important. In order to ensure the security of data during transmission and storage, we need to encrypt sensitive information. This article will introduce how to use PHP to encrypt and decrypt data to improve data confidentiality and integrity. Data encryption: When making API requests, we need to encrypt sensitive information to ensure data security. common

PHP mailbox development: implementing email encryption and decryption functions PHP mailbox development: implementing email encryption and decryption functions Sep 12, 2023 am 10:40 AM

PHP mailbox development: realizing email encryption and decryption functions. With the increasing development of information transmission, email has become one of the important communication methods for people. However, the ensuing security issues have gradually attracted people's attention. In order to protect the security of emails, encryption and decryption have become important aspects of sending and receiving emails. This article will introduce how to use PHP to develop email encryption and decryption functions to improve email security. 1. Principle and function of encryption Email encryption is to convert the email content using a specific algorithm so that in addition to the recipient

What are the commonly used encryption and decryption tools in Java function libraries? What are the commonly used encryption and decryption tools in Java function libraries? May 05, 2024 am 08:54 AM

The Java function library provides a wealth of encryption and decryption tools, including JCE, JCA, Apache CommonsCrypt, etc. JCE provides encryption algorithms and functions, JCA provides interfaces to access encryption service providers, and Apache CommonsCrypt contains more encryption algorithms and tools. The practical case shows how to use JCE to AES encrypt text and generate Base64-encoded ciphertext.

How to use Go's SectionReader module to encrypt and decrypt the content of a specified part of a file? How to use Go's SectionReader module to encrypt and decrypt the content of a specified part of a file? Jul 23, 2023 am 08:24 AM

How to use Go's SectionReader module to encrypt and decrypt the content of a specified part of a file? Introduction: In development, file content encryption and decryption is a very common requirement. The Go language provides a wealth of libraries and modules to meet this need. Among them, SectionReader is a very practical module that allows us to specify the range of content in a large file and perform reading, encryption, and decryption operations. This article will introduce how to use Go’s SectionReader module to implement

See all articles