why not just implement the write to MBR? figure out how the copy
protector does it and just implement it.  as long as you know what
you're doing and where the O/S stores its stuff you should be alright.
put a few warnings on the instaeller and whatnot that this might be
risky, and then let the user decide for himself :)

On 10/4/06, Stefan Dösinger <[EMAIL PROTECTED]> wrote:
> what keeps some nosy haxx0r from looking in the MBR (or some blocks
> later) if he wants to find out about the copy protection? if they store
> data like this unprotected (e.g. crypting them) then this is just
> security-by-obscurity (which is no security at all).
Copy protection IS security by obscurity from a cryptography point of view ;-)

http://en.wikipedia.org/wiki/Kerckhoffs'_principle

The thing is that the user HAS to be able to decrypt the movie / game /
whatever and use it, so in some form he HAS to have the keys. The only thing
that can be hidden is the algorithm and the location of the keys(sort of part
of the algorithm). This can't work from a mathematical point of view.

What makes copy protection problematic to circumvent is not the math or the
technical stuff, it is the laws protecting it :-(









Reply via email to