
Originally Posted by
DarkstaR
As for spoofing configuration, I was considering it the other day. All possible strings are stored in clear-text in the binary, and can be easily extracted from each binary and sent at random. My worry there, though, is that sending so many different configurations to the server would be indicative of such a system. Moreover, the spoofer may have to make sure the data makes sense; What, for example if I say it's a PCIE3 card but a processor who socket is ancient, and not on any boards past PCIE1? Or can we assume Cip wouldn't try to detect this either?