Hi Pat,

Definitely not - we were aware of that problem too.

The anti-piracy software uses much more passive (read only) ways of
identifying computers.

It sounds like you are more interested in the anti-hacking software,
however. This is designed to discourage specifically reverse engineering
and modification of your software.

It called Stealth and it's not yet on our Website - let me know if you
want more information.

Best Regards, 

Jim 

Jim McCartney, P. Eng
CEO 
CrypKey (Canada) Inc.
Phone: (403) 258-6274 
Email: [EMAIL PROTECTED] 
Web: http://www.crypkey.com 
"battle-proven software protection & license control"

 

 


-----Original Message-----
From: Pat Deegan [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, June 24, 2003 5:02 PM
To: [EMAIL PROTECTED]
Subject: RE: choosing the right algorithm

Hello Jim,

On Tue, 2003-06-24 at 18:01, Jim wrote:
> Hi Pat,
> 
> Jason is right, you can't stop the software user from changing the
> certificate.
> 
> However, you _can_ slow them down.

Any algorithms/details/hints on how to proceed?  (This is getting rather
offtopic, though...)

> We have created some new software that does a particularly good job of
> encrypting software, in file and in memory. It also stops debuggers,
> which is the tool a hacker would use to replace the certificate.

Took a look at the crypkey site. Looks interesting (only for Windows?)
but this quote:

"Short of a low-level format, if the user wants to run the software on
that computer, they'll need your authorization to do so."

reminded me of Intuit's TurboTax - hey got all sorts of heat because
they were messing with people's master boot record, or at least the
unused space between the MBR and the first partition - are you doing
something similar?

Regards,
-- 
Pat Deegan,
http://www.psychogenic.com/
PGP: http://www.keyserver.net 0x03F86A50

Reply via email to