Hi Pat, Definitely not - we were aware of that problem too.
The anti-piracy software uses much more passive (read only) ways of identifying computers. It sounds like you are more interested in the anti-hacking software, however. This is designed to discourage specifically reverse engineering and modification of your software. It called Stealth and it's not yet on our Website - let me know if you want more information. Best Regards, Jim Jim McCartney, P. Eng CEO CrypKey (Canada) Inc. Phone: (403) 258-6274 Email: [EMAIL PROTECTED] Web: http://www.crypkey.com "battle-proven software protection & license control" -----Original Message----- From: Pat Deegan [mailto:[EMAIL PROTECTED] Sent: Tuesday, June 24, 2003 5:02 PM To: [EMAIL PROTECTED] Subject: RE: choosing the right algorithm Hello Jim, On Tue, 2003-06-24 at 18:01, Jim wrote: > Hi Pat, > > Jason is right, you can't stop the software user from changing the > certificate. > > However, you _can_ slow them down. Any algorithms/details/hints on how to proceed? (This is getting rather offtopic, though...) > We have created some new software that does a particularly good job of > encrypting software, in file and in memory. It also stops debuggers, > which is the tool a hacker would use to replace the certificate. Took a look at the crypkey site. Looks interesting (only for Windows?) but this quote: "Short of a low-level format, if the user wants to run the software on that computer, they'll need your authorization to do so." reminded me of Intuit's TurboTax - hey got all sorts of heat because they were messing with people's master boot record, or at least the unused space between the MBR and the first partition - are you doing something similar? Regards, -- Pat Deegan, http://www.psychogenic.com/ PGP: http://www.keyserver.net 0x03F86A50
