Skip to content

Noobgamer0111/SubwaySurfersDecrypted

Repository files navigation

SubwaySurfersDecrypted

Figuring out the new encryption used for the Subway Surfers profile *.jsons. This is basically an attempt to decrypt/decipher the new Version 3 of the profile *.json files stored on the Android version of Subway Surfers.

Why? Previously, the *.json files' contents used to store the user's game data in plaintext (i.e. what you see here), yet with the September 2022 update (v3.1.0), this content was encrypted, making it temporarily impossible for users with JSON editors to change out the values.

This encryption of previously-accessible content was seemingly caused by the explosion of Tiktoks and Youtube videos during July-September 2022 that provided live examples of editing JSON files to exploit in-game currency. However, this method of editing JSON files predictably angered Kiloo (publisher), given that the sale of Coins and Keys via microtransactions are the sole two sources of income for this game.

AIM: To successfully decrypt the json contents, and to be able to release tools to do so.

It is not expected that this project will be successful in any form, and I am expecting a Cease & Desist notice if Kiloo/SYBO took action against me.

Update: (29/01/2023) I have not forgotten this project. This project is tedious as my machines are both old, and weak. I'm planning to get an Android emulator running on my Ubuntu laptop, so it can done more easily.

The current plan is to locate the initialisation vector (IV) and confirm if any keys found are actually correct.

If only kids on TikTok could actually STFU about game modification, and piracy, this project would not have to exist.

Update (26/05/2023):

Nothing much has changed with this project. Currently, the most effective tactic available (the HerrErde method) is to generate a JSON in the original format, and add the intended values. After that, the new JSON is copied into the target folder to be replaced.

When this new JSON is inserted, it will be re-formatted to the V3 style and encrypted upon first load of the SS application.

Additionally, we need more people searching for the key location. I'm suspecting it's hidden to the user, but may be visible using a rooted Android device/emulator. Some people have claimed that they've cracked it, but there is no major breakthrough so far.

Discord Server: https://discord.gg/NAXbNwKK2V