> >   wola.. the byte change is from 0x66 to 0x67, and, the crackers
> >   just reversed your "registration check". it means squat how good
> >   your key is, if they can still mess with the code directly and
> >   change the internal logic of the program.
> 
> No one would protect code just doing that.  There are lots of things
> you can do cryptographically (anyone want to help me get an export
> license for my Palm Open PGP implementation)?  And with hardware.

  they can still get around the hardware too, hook up palm-debugger
  to the device, and there you go, everything is open again.
 
  well, i was encrypting a code segment based on an RC4 encryption
  algorithm - it doesn't take half a brain to figure out.. "hey, 
  lets make the emulator/device perform the decryption" if they 
  can read your code well enough (well, the disassembled stuff) 
  they will know where to setup a "trap #8" just after your 
  decryption routine was called. then, they have access to it 
  in its natural form.

  cryptography = means nothing here. you MUST return to the original
  data at some stage, and this is where it is vunerable. 

> If you think your system is so good, then I offer this challenge.
> Alter your license to make cracks legal if the method and sources to
> the crack are given.  So if you fail, the Palm Economy gets the
> current version of your product free.  Maybe your system is snake-oil,
> maybe it is robust.  But since places like PalmGear and Palm
> Inc. probably wouldn't accept a counterpaper explaining how the system
> is weak or could be cracked (e.g. the beam prevent flag), any
> challenger doesn't have a publisher.

  did i burst your bubble today? and, to correct you - the "trojan"
  had nothing to do with the protection system. it was in fact, a 
  seperate application - it just happened to share the same icon as 
  the official liberty applicaiton

  my games are FREE - and yes, i dont believe my system is "perfect"
  you will NEVER be able to develop a system that is fool proof. the
  only thing you can do is make it difficult enough so that they will
  give up. i dont care if people crack software - i look into this 
  out of 100% pure interest, other people are interested in it too.

  in many cases, this is all that is required to have a crack-deterrant.

  it all depends on your application - if people want it bad, and it
  is really good, then they wont rest until they crack it. do you 
  also think that the people who deal with warez are even going to 
  buy the software? no.

> Back in the Atari ST days I saw quite a few things.  One system had
> 80% of the floppys fail on every system.  All were eventually cracked.

  you need to draw the line.

  consider all options - a) users, b) crackers. the risk should never
  be placed on the users. do some simple checks.. keep it transparent
  to the users, and everything should be fine.

  i think, the problem is that Palm used the m68k processor :) heaps
  of old amiga people out there - still loving to crack away :P and 
  heck, m68k is the entry level assembler in most universities these
  days! 

  cheers

// az
[EMAIL PROTECTED]
http://www.ardiri.com/    <--- free games!


-- 
For information on using the Palm Developer Forums, or to unsubscribe, please see 
http://www.palmos.com/dev/tech/support/forums/

Reply via email to