Content controls

Dr.Dimitri Vulis KOTM dlv at bwalk.dm.com
Tue Nov 11 16:57:44 PST 1997



Tim May <tcmay at got.net> writes:
> Even purely digital works are easily copied. Even unique IDs per software
> piece are easily removed (e.g., by having N customers compare and diff out
> the noncommon bits).

About 15 years ago I was trying to break the code in some software
distributed by some Canadian folks... (It was cheap to buy, and
I was doing it for fun.) Basically, every customer's executables
were almost completely different because they were encrypted with
a totally different key and decrypted at runtime.  The trick was to
disassemble the decryption code and to compare the decryption
results from two copies to see where the customer name was embedded.

---

Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps







More information about the cypherpunks-legacy mailing list