Solved

What do you say about this protection ?

Posted on 2002-06-10
11
150 Views
Last Modified: 2010-04-04
I found this tip on net :
http://www.delphifr.com/article.aspx?Val=317

What is your opinion ?
0
Comment
Question by:ginsonic
  • 3
  • 3
  • 2
  • +2
11 Comments
 
LVL 45

Expert Comment

by:aikimark
ID: 7069034
Since I don't read French, I am commenting on the apparent function of the Pascal code in your link.

While the use of an external file can/does provide a long encryption key (relative to the data to be encoded), you have provided the key for some user to decrypt the file.

You would have better/stronger encryption to seed the Delphi random number generator in both the encryptor and decryptor routines and use the resulting values to protect your data.
0
 
LVL 17

Accepted Solution

by:
inthe earned 50 total points
ID: 7069056
hi,
i dont read french but from the looks of it if someone was copying a cd with that protection  it would take them longer but all would be needed is to copy it to harddisk, jmp over the CheckIfOriginalCd calls ,and reburn a new master to make that technique no good.

the best thing to do is to use multiple amounts of these types of techniques to make it as difficult as possible to do so that potential "back-uppers" get annoyed and giveup..
0
 
LVL 45

Expert Comment

by:aikimark
ID: 7069218
ginsonic,

What do you have in mind?
Can you do some translation for us?

======================================
Did you hear about the Sony CD protection scheme that could be circumvented by blackening the outside edge with a felt-tip marker?  Needless to say, the protection was a joke and the CD player never made it to store shelves in America.  Neither Sony nor the music industry vendors were amused.
0
 
LVL 9

Author Comment

by:ginsonic
ID: 7070262
inthe, how can be copyed a corupted file ?
0
 
LVL 3

Expert Comment

by:smurff
ID: 7070434
ginsonic

No matter what TYPE of protection you use because at the end of the day you will have some lines of code that will compare a value of Registered or Not etc etc and that is easy to crack e.g.


:00403B85 8B4DE8                  mov ecx, dword ptr [ebp-18]
:00403B88 3B4D08                  cmp ecx, dword ptr [ebp+08]
:00403B8B 0F8387010000            jne 00403D18

All that has to be done is patch the jump or the memory address on startup.

Or in the instance of the code you suggest is that you patch the return val e.g.

:00403DA4 8BE5                    mov esp, ebp
:00403DA6 5D                      pop ebp
:00403DA7 C20400                  ret 0004

you just put ....

:00403DA4 8BE5                    mov ebp, 01
:00403DA6 5D                      pop ebp
:00403DA7 C20400                  ret 0004

I have looked into this a lot and theres not much you can do. My 2 pence
Regards
Smurff
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 5

Expert Comment

by:Gwena
ID: 7071350
You cannot protect the data on a cd unless you control the hardware it runs on.. ala DIVX at Circuit City



It's all a numbers game in real life anyway... a certain percentage of people will bootleg your program... lets say that 10,000 people will eventually pirate your app if you don't protect it at all.. well maybe 9000 of them are such cheap @#$%'s that they would NEVER buy it even if it only cost a nickle... so you can't possible lose anything on them anyway... so let them pirate it... what difference can if make?  and maybe they will praise the software to their friends and a few might actually buy it :-)

Of the 1000 that are left that would actually buy your app if it were not already being passed around all the warez groups maybe 900 would give up and buy it if you put a lot of simple protection schemes in it that popped up randomly... a hacker will find the first one and crack that... then upload it to alt.binaries.warez.im-so-smart
and then move on to crack the next application he comes across... and then a few week or months later the pirated software starts to fail when your 2nd piece of protection code kicks in... many of the pirates will now like your app so much that maybe they will buy it... after all.. they are using it everyday and the crack failed..and now they depend on it :-)


p.s. Just make the first protection scheme real easy to crack... that way you draw in more pirates quicker... and when the crack fails you may have many eager buyers ;-)

0
 
LVL 5

Expert Comment

by:Gwena
ID: 7071358
Oh!
Perhaps the saddest thing that can happen is that your program is so lame that nobody even bothers to crack it and upload it to the warez groups... imagine if nobody wanted your stuff... even for free :-/
0
 
LVL 9

Author Comment

by:ginsonic
ID: 7071981
I remember my first two components . I found these thanks to hazard ( I received a message from a warez group with a cracks list ). Just one week after release.

And I wish to say that I was glad to find my components on list :)
0
 
LVL 45

Expert Comment

by:aikimark
ID: 7072682
Are you writing a component or an application?  If you want to protect an application, you should look at some of the "wrapping" technologies.  I use one from Bit-Arts.
0
 
LVL 17

Expert Comment

by:inthe
ID: 7076413
>> how can be copyed a corupted file ?

via "bit" copying ,files are irrelevent at bit level.
nero etc shouldnt have a problem doing it.
0
 
LVL 9

Author Comment

by:ginsonic
ID: 7082884
Thanks to all for support,
Nick
0

Featured Post

Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

Join & Write a Comment

The uses clause is one of those things that just tends to grow and grow. Most of the time this is in the main form, as it's from this form that all others are called. If you have a big application (including many forms), the uses clause in the in…
Introduction Raise your hands if you were as upset with FireMonkey as I was when I discovered that there was no TListview.  I use TListView in almost all of my applications I've written, and I was not going to compromise by resorting to TStringGrid…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now