Re: The Prolok Saga (Was: Applesauce FDC

2022-01-04 Thread Alexandre Souza via cctalk
Fred, a completely unrelated piece of information, but interesting
nonetheless:

Elnec device programmers are very famous for the number of devices it
programs and its robustness. Also for their clones. If you open a cloned
beeprog you cannot differ it from an original beeprog.

I still haven't completely reverse engineered the protection, but it seems
to be related to the serial number. If any host software beyond 2.63
detects a "fake programmer" it BRICKS the cloned prigrammer. Yes, rends it
useless. You gotta reprogram a pair of eeproms and a pic to make it work
back again.

You told about the prolok plus erasing hds and I remembered of this atitude
from elnec. And no, I know of no one that sued elnec for bricking their
clone programmer.

So bad. They are great programmers, I have an old beeprog.

73 de pu2sex Alexandre

Enviado do meu Tele-Movel

Em ter, 2 de nov de 2021 17:35, Fred Cisin via cctalk 
escreveu:

> On Tue, 2 Nov 2021, dwight via cctalk wrote:
> > The trickiest protection I've seen is where there is a hole punched
> > through the disk on one track. The idea is that the protected program
> > writes to that track and expects to see a failure to read that track.
> It doesn'tneed to be a hole all the way through, merely any physical
> defect that renders that spot unusable.
>
> The "Physical Defect" protection.
>
> Copy protected disks had already been made with flawed content to produce
> an error on READ, and were easily circumvented by the "duplicate" copy
> having flawed content. The next step was to have a physical defect, so
> that the protection software would WRITE to the bad track, and confirm
> that the track really was damaged.
> So, they would scratch the disk.
> In the case of Prolok, the check to confirm a physical defect consisted of
> writing all zeroes to that area; verifying all zeroes; writing all ones;
> and verifying all ones.
>
>
> Vault Corporation produced "Prolok" with a physical defect.  To make it
> MUCH MORE IMPRESSIVE to investors and clients, instead of a roomful of
> people scratching disks with paperclips, they used a "laser fingerprint"
> (use a laser, instead of a paperclip).
>
> Since they gave the same or similar subroutines, that checked for the
> defect, to every client, it was cracked with software that would locate
> that subroutine, and replace the subroutine call with NOPs or gut the
> innards of the subroutine.  The cracks were often posted on Compuserve.
> (Vault sued Quaid software for "CopyWrite"/"RAMKEY")
> https://casetext.com/case/vault-corp-v-quaid-software-ltd )
>
> For "cloning" (pirating copies, often with the Central Point Option
> board (flux hardware)), software was developed that would
> identify the location of the defect, the cloner would then attempt to
> scratch the disk at that location, and then the software would locate the
> defect and juggle stuff around to put the content in the right place(s)
> relative to the defect.
>
>
> But, Vault Corporation wasn't satisfied until they shot themselves in the
> foot with very high caliber rounds.
> They announced "Prlok PLUS".  W. Krag Brotby (chairman of Vault) said that
> it would, if it detected a "fake" copy, wipe out the user's hard disk!
> Even at the announcement of Prolok PLUS, the computer marketing
> community was aghast and enraged.  It doesn't take much to realize the PR
> nightmare, and the legal liabilities for damaging a customer computer,
> even if it was NOT a false positive!
>
> Ashton-Tate, the largest Prolok client for dBase III, and part
> owner of Vault, immediately cancelled their contracts.  And announced
> that they had done so, that they had never used Prolok Plus, never would,
> and no longer used Vault Corporation products.
> Almost all of Vault's other clients follwed suit.
>
> Prolok Plus never made it to market!
> 'Course the "word was out".  Few people realize that it was NEVER
> actually put to use.  In fact some of the more idiotic newspaper "solve
> your computer problems" columnists, when stumped, would actually speculate
> "maybe your computer was attacked by an out of control copy-protection
> program."
>
>
> So, we ended up with a mythical monster, and the creator of that mythical
> monster was vanquished.
>
> If anybody can document an actual existence of Prolok Plus, I would like
> to hear about it.
>
>
> There is little mention of it on the web, but:
>
> https://tech.slashdot.org/story/08/06/09/1927205/a-history-of-copy-protection
> "Re:Ahhh, holes burned in disks (Score:5, Informative)"
>
>
> https://books.google.com/books?id=9y4EMBAJ=PA19=PA19=prolok+plus+copy+protection+vault+corporation=bl=9Y7SBcnFx9=ACfU3U3JDSEI-QjLjMi1V_gWdPq8gaHrHg=en=X=2ahUKEwjijpjCufrzAhX2TDABHXh2DBgQ6AF6BAgHEAM#v=onepage=prolok%20plus%20copy%20protection%20vault%20corporation=false
>
> https://www.pcjs.org/blog/2019/05/05/
> Kryoflux display of Prolok
>
> --
> Grumpy Ol' Fred
>


Re: The Prolok Saga (Was: Applesauce FDC

2022-01-03 Thread Tony Aiuto via cctalk
Just as my first product was about to go to market, the company president
decided we needed copy protection. He wanted Prolok. I objected, and
proposed that if I could break it in 24 hours, we wouldn't use it. I took
25 hours, and we did use it (fair is fair).

I finally found my notes and the unlock tool.  The very cryptic notes
included inline. I haven't decided where to post the source yet. If anyone
has prolok'ed disks and want to try it out, I'll be happy to send it to
you. I don't run physical DOS machines any more, so my ability to test is
limited.  If you want to just run a random EXE from 1983, you can try
UNPROLOK.EXE here.
https://drive.google.com/corp/drive/folders/1amoYi_fY6f2UYdYeTA1o86rmAtYpsLfF


--- snip ---
prolok.doc  prolok information sheet

How to Un-Prolok a file

db xxx.exe

A:  g 20start up
g =27 3bskip int 1 and int 3 steal
r si 1  ruin debugger test
g 443
t
t
t   should be at 54b
g =47d 481
AL is set to correct disk

B:
g 4a8
make sure AH is 0x10, Carry set
at 4c3 the is a write interrupt
that must succeed
g 4c5
r f NC  clear Carry bit
r AX 0  set AH to 0

g 4d2   Carry should be on, AX = 1000
g 4ea   make sure BX has 47 (from table at 870)
C:
repeat area from B to C for second entry in table

D:
g 51c
trick decryption part
t 700
t c0
t   until SI = 533  (about 20 times)
g 53e
BX should be 0,
g 54e
r
ax = 0, bx = 0, cx = 0, dx = 1, sp = 866, bp = 0
si = 45a, di = 54d, cs, ss, ds, es = 283e
flags: NV UP EI PL ZR NA PE NC
g 57e
r f ZR
g 58b
r f ZR

g 5b0
t
g =5b6 5b9  skip steal of int 21
t
g =5bf 5d3
g =5e4 5e6  skip steal of int 27h

F:  convert user program
r   BX = number of 512 byte PAGES in file
g 5f4   ax has base segment of user code
g 627

at this point we have the converted user program in
main memory.

G:  write it to disk
d 0
examine the first few bytes
if the first two are 5a 4d  or 4d 5a then it is
a .EXE file else a .COM file.

N outfile.com   if it was .EXE you will have to rename it after

compute PAGES * 0x200
r cx, bxthe above value
w 970
q   if you continue from this point bx, cx are set wrong
H:  if we continued rather than writing the file
g 637
g =642 644

---
Data Areas (all in CS)

Address (+100)  What

78b 88b store initial int 21h vector IP (0:84)
78d 88d store initial int 21h vector CS (0:86)

78b 88b store initial int 21h vector IP (0:9c)
78b 88b store initial int 21h vector CS (0:9e)

78b 88b segment of base of user code (cs:970)

^L

How to disassemble Un-Prolok.exe

d   0 l 100
d cs:0 l 450

u  11 l 40
u 430 l 29
d 458 l 3
u 45b l 23
u 47d l 90
u 50d l f

d cs:50d l f
u 51c l 32
u 54e l 98
u 5e6 l 180

d cs:765 l b

u 770 l 73
u 7e2 l 50

d cs:820 l 150

u 970 l 360
d cs:0800 l 800
d cs:1000 l 800
d cs:1800 l 800
d cs:2000 l 400

q
prolok.doc  prolok information sheet


How to Un-Prolok a file

db xxx.exe

A:  g 20start up
g =27 3bskip int 1 and int 3 steal
r si 1  ruin debugger test
g 443
t
t
t   should be at 54b
g =47d 481
AL is set to correct disk

B:
g 4a8
make sure AH is 0x10, Carry set
at 4c3 the is a write interrupt
that must succeed
g 4c5
r f NC  clear Carry bit
r AX 0  set AH to 0

g 4d2   Carry should be on, AX = 1000
g 4ea   make sure BX has 47 (from table at 870)
C:
repeat area from B to C for second entry in table

D:
g 51c
trick decryption part
t 700
t c0
t   until SI = 533  (about 20 times)
g 53e
BX should be 0,
g 54e
r
ax = 0, bx = 0, cx = 0, dx = 1, sp = 866, bp = 0
si = 45a, di = 54d, cs, ss, ds, es = 283e
flags: NV UP EI PL ZR NA PE NC
g 57e
r f ZR
g 

RE: The Prolok Saga (Was: Applesauce FDC

2021-11-03 Thread Marvin Johnston via cctalk



Another thing Prolok did was produce a small 3 disk set of sample disks 
with the Prolok protection. Somewhere around here I still have a set of 
those disks.


As I recall, a program was included on each disk to copy the program to 
be copy protected to the special disk.


RE: The Prolok Saga (Was: Applesauce FDC

2021-11-02 Thread Fred Cisin via cctalk

Vault Corporation produced "Prolok" with a physical defect.  To make it


On Tue, 2 Nov 2021, Ali wrote:

Which could be defeated w/ the Copy II Plus Enhanced Option board:
http://retro.icequake.net/dob/img/eob/


There were many ways around it.

Because Vault didn't write a new software package for each client, it was 
fairly easy, after some [not always easy] disassembly to make a patch that 
cracked it.  Those patches were widely distributed, and the end user only 
knew that it was a small patch.



I find it important to note that the Vault VS Quaid lawsuit was before 
DMCA.  Afterwards, Vault might have prevailed!  At the time, disassembly 
and bypassing copy-protection was not illegaal.
But, Vault tried to claim that Quaid's software infringed on Vault's 
copyright!  The courts ruled that Quaid's software was in no way a copy of 
Vault's.  There was no sftware by Vault included inside the Quaid 
software.


The announcement of Prolok-PLUS was insane, and destroyed Vault.


There were many other protection schemes.

Early on, I noticed that the software with the Central Point Option 
Board could not work if it didn't see the index hole.  As a proof of 
concept, I showed that one could write a disk disk without an index hole 
(indexing on spindle, or covering the hole (moving cookie to a flipped 
jacket)) that couldn't be copied by the Option Board, but could be copied 
by DISKCOPY.





RE: The Prolok Saga (Was: Applesauce FDC

2021-11-02 Thread Ali via cctalk
> Vault Corporation produced "Prolok" with a physical defect.  To make it
> MUCH MORE IMPRESSIVE to investors and clients, instead of a roomful of
> people scratching disks with paperclips, they used a "laser
> fingerprint"
> (use a laser, instead of a paperclip).

Which could be defeated w/ the Copy II Plus Enhanced Option board:

http://retro.icequake.net/dob/img/eob/

This board had a small bit of onboard RAM that would load info about the
defect:

"EOB has an extra circuitry that allows it to emulate a burn-hole in a
diskette and cause a running application to think that the original
diskette is present inside the drive. As it can be understood, the copy
of a burn-hole protected diskette can only be executed on a computer
equipped with the standard or deluxe EOB.

In order to create a working copy of a diskette that is protected by a
physically damaged media, the diskette has to be copied using the regular
option board methods (TC/TCM), and then the EOB utility PK.COM must be
executed in order to analyze the original diskette and locate the exact
place of the burn-hole. Once the place has been found, PK saves the data
in a file for future use.

Every time before the copied diskette is used, the PK application must be
executed with the filename that contains the information as a parameter.
Then, PK will program the EPROM that is present on the EOB, according to
the information inside that file.

Whenever the copy protected application tests for the original diskette
and tries to read from (or write to) the physically damaged sector, the
EOB emulates the very exact behavior of a physically damaged media at the
exact place where the burn-hole was, thus confusing the application to think
that the original diskette is present inside the drive."