If you want to verify that a genuine dongle is present, that's easy, but
I have no idea how you would communicate with the dongle from
ActionScript... You would almost definitely have to use an external
program.  I can think of a few Flash-drive-like dongle designs, but the
development cost may be very near the development cost of your entire
application.

Honestly, the best thing might be to go with a commercial anti-piracy
package.  These packages have already had the cost distributed over
multiple sales.  You won't have to reinvent the wheel, and you will have
a reasonable balance between price and effectiveness.

Now that the topic has come up though, I just might persue making such a
dongle... Hmm.

- Kipp

> -----Original Message-----
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf 
> Of nik crosina
> Sent: Tuesday, April 17, 2007 4:52 PM
> To: flashcoders@chattyfig.figleaf.com
> Subject: Re: [Flashcoders] [semi-OT] - Preventing Software Piracy
> 
> 
> Hi Kipp,
> 
> that sounds exactly like the strategies recommended to me by 
> the Aladdin guys, and their manuals. And it also sounds 
> logical to me. The question to me is now whether I can tie a 
> dongle into actions script and then e.g. obfuscate the code 
> to a high enough degree that it would be above the pain level 
> of most crackers hackers and pirates.
> 
> I do understand that it is impossible to create something 
> bullet proof, but some big pain in the ass is what (and I 
> guess most) developers are after. At least it prevents the 
> layman user from just making a copy for their colleague, etc.
> 
> Nik C
> 
> On 4/17/07, Michael Mudge <[EMAIL PROTECTED]> wrote:
> > I can make a cheap, cryptographically secure USB or Serial 
> dongle no 
> > problem.
> >
> > However, the issue with any kind of software-based security is that 
> > once the software is on a client's machine, the client can 
> do whatever 
> > he wants with it; modify it not to use the dongle.
> >
> > But you CAN make it a serious pain in the ass.  In 
> unmanaged languages 
> > like C, it is especially helpful to make the program inherently 
> > incapable of running without the dongle -- by using the dongle to 
> > perform some essential calculation that isn't in your 
> program, or by 
> > sending the dongle pieces of your program's code to 
> "verify" that it's 
> > been unaltered.  Sometimes making a checksum of your own 
> code works, 
> > but then sometimes a hacker can use your own checksum algorithm to 
> > hack in a new checksum...
> >
> > ...so how far do you want to go with this?
> >
> > - Kipp
> >
> > > Hi Weyert,
> > >
> > > Can a dongle easily be circumvented then?
> > > What's the best way of protection then, and do you know where I 
> > > would find a specialist in this?
> > >
> > > Thanks,
> > >
> > > Nik
> > >
> > > On 4/17/07, Weyert de Boer <[EMAIL PROTECTED]> wrote:
> > > > Hi Nik,
> > > >
> > > > I have done research for my dad a while ago, and I came to the 
> > > > conclusion that it wasn't worth the effort $$$ wise.
> > > > > Not sure whether that is applicable to your project,
> > > Pete, but has
> > > > > anyone ever used dongle (i.e. hardware) protection for their 
> > > > > projects? I am currently testing out HASP from Aladdin,
> > > and does the
> > > > > job so far (have not come very far yet in testing though).
> > > > Yes, the problem with dongles is that it's quite hard to 
> > > > implement, right. Especially, I would like to advice 
> you not take 
> > > > any of the included examples or even consider build on 
> top of it. 
> > > > The examples are weak. Please rent some person who is 
> fully into 
> > > > the dongle and encryption. If not, it will be lost money.
> > > >
> > > > > What do you guys think about this kind of protection? Why
> > > isn't it
> > > > > used more often?
> > > > Because it's a big investment to implement.
> > > >
> > > > Yours,
> > > > Weyert de Boer
> > > >
> > > > _______________________________________________
> > > > Flashcoders@chattyfig.figleaf.com
> > > > To change your subscription options or search the archive: 
> > > > http://chattyfig.figleaf.com/mailman/listinfo/flashcoders
> > > >
> > > > Brought to you by Fig Leaf Software
> > > > Premier Authorized Adobe Consulting and Training 
> > > > http://www.figleaf.com http://training.figleaf.com
> > > >
> > >
> > >
> > > --
> > > Nik C
> > > _______________________________________________
> > > Flashcoders@chattyfig.figleaf.com
> > > To change your subscription options or search the archive: 
> > > http://chattyfig.figleaf.com/mailman/listinfo/flashcoders
> > >
> > > Brought to you by Fig Leaf Software
> > > Premier Authorized Adobe Consulting and Training 
> > > http://www.figleaf.com http://training.figleaf.com
> > >
> >
> > _______________________________________________
> > Flashcoders@chattyfig.figleaf.com
> > To change your subscription options or search the archive: 
> > http://chattyfig.figleaf.com/mailman/listinfo/flashcoders
> >
> > Brought to you by Fig Leaf Software
> > Premier Authorized Adobe Consulting and Training 
> > http://www.figleaf.com http://training.figleaf.com
> >
> 
> 
> -- 
> Nik C
> _______________________________________________
> Flashcoders@chattyfig.figleaf.com
> To change your subscription options or search the archive:
> http://chattyfig.figleaf.com/mailman/listinfo/flashcoders
> 
> Brought to you by Fig Leaf Software
> Premier Authorized Adobe Consulting and Training
> http://www.figleaf.com
> http://training.figleaf.com
> 

_______________________________________________
Flashcoders@chattyfig.figleaf.com
To change your subscription options or search the archive:
http://chattyfig.figleaf.com/mailman/listinfo/flashcoders

Brought to you by Fig Leaf Software
Premier Authorized Adobe Consulting and Training
http://www.figleaf.com
http://training.figleaf.com

Reply via email to