Evil Copy Protection vs. Good Crypto-Capable Objects