Software Security
Jammer
jammer at jammer.biz
Tue Aug 17 17:34:46 CEST 2021
BOOM.
Exactly this. I think people get really, REALLY convoluted in these
things. All these crazy processes and obfuscation can introduce
stability risks imho and for minimal real world gain. There isn't a
system out there that hasn't been hacked. iLok et al are just silly imho.
At best you're just going to to try to keep people honest, the people
that use cracked versions were unlikely to pay for it anyway.
Partial Key validation can be a good approach too.
I just wrote my own based around public / private keys. Wrote a little
tool to query my sales back-end and automates producing a key and
emailing it to the user. Email has a button to click that launches the
app and stuffs the code in. They don't even have to type anything or
even copy+paste anything (unless it's web based email client). I also
didn't want the user to *have* to have an internet connection, nor any
calling home.
Horses for courses though.
On 17/08/2021 16:14, Joost Schuttelaar wrote:
> On 17 Aug 2021, at 16:07, Matt Picone <matt at mysticworks.com> wrote:
>
>> Does anyone here have skills or know anyone who is strong in the area of development around audio software anti piracy?
> No expertise, but a very interesting topic!
>
> Aren’t most copy protection schemes quite trivial to break these days, when Mac’s for instance enforce memory as non-executable, and have features like address space randomization on by default? I remember that things like iLok basically do tons of self inspections to see if code was modified, right?
>
> I think the best copy protection schemes are: user loyalty, some quite useful cloud features and frequent updates (just make it hard to stay up to date…)
>
> Cheers,
>
--
*Jammer*
WWW.JAMMER.BIZ <http://www.jammer.biz>**
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.music-bar.org/pipermail/music-bar/attachments/20210817/b304c9f5/attachment.htm>
More information about the music-bar
mailing list