Preventing copy protection circumvention
Asked Answered
M

18

16

Anyone visiting a torrent tracker is sure to find droves of "cracked" programs ranging from simple shareware to software suites costing thousands of dollars. It seems that as long as the program does not rely on a remote service (e.g. an MMORPG) that any built-in copy protection or user authentication is useless.

Is it effectively not possible to prevent a cracker from circumventing the copy protection? Why?

Mcgruter answered 14/10, 2008 at 23:37 Comment(0)
D
7

Sorry to bust in on an ancient thread, but this is what we do for a living and we're really really good at it. It's all we do. So some of the information here is wrong and I want to set the record straight.

Theoretically uncrackable protection is not only possible it's what we sell. The basic model the major copy protection vendors (including us) follow is to use encryption of the exe and dlls and a secret key to decrypt at runtime.

There are three components:

  1. Very strong encryption: we use AES 128-bit encryption which is effectively immune to a brute force attack. Some day when quantum computers are common it might be possible to break it but it's unreasonable to assume you will crack this strength encryption to copy software as opposed to national secrets.

  2. Secure key storage: if a cracker can get the key to the encryption, you're hosed. The only way to GUARANTEE a key can't be stolen is to store it on a secure device. We use a dongle (it comes in many flavors but the OS always just sees it as a removable flash drive). The dongle stores the key on a smart card chip which is hardened against side channel attacks like DPA. The key generation is tied to multiple factors which are non-deterministic and dynamic so no single key/master crack is possible. The communication between the key storage and the runtime on the computer is also encrypted so a man-in-the-middle attack is thwarted.

  3. Debugger detection: Basically you want to stop a cracker from taking a snapshot of memory (after decryption) and making an executable out of that. Some of the stuff we do to prevent this is secret, but in general we allow for debugger detection and lock the license when a debugger is present (this is an optional setting). We also never completely decrypt the entire program in memory so you can never get all the code by "stealing" memory.

We have a full time cryptologist who can crack just about anybody's protection system. He spends all his time studying how to crack software so we can prevent it. So you don't think this is just a cheap shill for what we do, we're not unique: other companies such as SafeNet and Arxan Technologies can do some very strong protection as well.

A lot of software-only or obfuscation schemes are easy to crack since the cracker can just identify the program entry point and branch around any any license checking or other stuff the ISV has put in to try to prevent piracy. Some people even with dongles will throw up a dialog when the license isn't found--setting a breakpoint on that error will give the cracker a nice place in the assembly code to do a patch. Again, this requires unencrypted machine code to be available--something you don't get if you do strong encryption of the .exe.

One last thing: I think we're unique in that we've had several open contests where we provided a system to people and invited them to crack it. We've had some pretty hefty cash prizes but no one has yet cracked our system. If an ISV takes our system and implements it incorrectly it's no different from putting a great padlock on your front door attached to a cheap hasp with wood screws--easy to circumvent. But if you use our tools as we suggest we believe your software cannot be cracked.

HTH.

Drais answered 22/3, 2011 at 21:35 Comment(7)
Agreed that this is very strong encryption. However, the question was more directed toward software only schemes. Custom hardware (#2) is going to make cracking vastly harder.Riggall
Thanks for the info. I wasn't really thinking in terms of custom hardware, but perhaps that was naive of me.Mcgruter
You can do all three with a software-only solution, but as UsAaR33 said, storing key gen in a dongle is vastly more secure than in software only. However, even with a software-only solution you can encrypt your code making reverse-engineering or algorithm theft quite difficult.Drais
"Theoretically unbreakable"? It is quite easy to prove that any copy-protection system is breakable (in theory). Practically unbreakable on the other hand is very much possible. It should also be noted that all (sufficiently large) software contains bugs. This means that theoretically unbreakable protection is often breakable in practice.Trueblue
I second Hjulle's point. I suggest you edit this otherwise excellent posting to remove the phrase "theoretically unbreakable". It made me almost stop reading immediately, as obviously that's not correct.Overcapitalize
This claim is provably false. Find a client of this company or one of the others that use similar technology. Find out what software products they protect with it. Find same on BitTorrent sites, cracked.Dynameter
Eric just so you know I don't do this anymore (work for different company/different domain space) so I'm not arguing with you. But the fact is with the hardware keys it is virtually impossible to create a generic app crack. I'm only making this comment because there is so much mis-information around copy protection in general.Drais
A
20

No, it's not really possible to prevent it. You can make it extremely difficult - some Starforce versions apparently accomplished that, at the expense of seriously pissing off a number of "users" (victims might be more accurate).

Your code is running on their system and they can do whatever they want with it. Attach a debugger, modify memory, whatever. That's just how it is.

Spore appears to be an elegant example of where draconian efforts in this direction have not only totally failed to prevent it from being shared around P2P networks etc, but has significantly harmed the image of the product and almost certainly the sales.

Also worth noting that users may need to crack copy protection for their own use; I recall playing Diablo on my laptop some years back, which had no internal optical drive. So I dropped in a no-cd crack, and was then entertained for several hours on a long plane flight. Forcing that kind of check, and hence users to work around it is a misfeature of the stupidest kind.

Asphaltite answered 14/10, 2008 at 23:52 Comment(1)
Archived link: web.archive.org/web/20080919095807/http://www.amazon.com/review/…Galbreath
R
17

It is impossible to stop it without breaking your product. The proof:

Given: The people you are trying to prevent from hacking/stealing will inevitably be much more technically sophisticated than a large portion of your market.
Given: Your product will be used by some members of the public.
Given: Using your product requires access to it's data on some level.

Therefore, You have to released you encrypt-key/copy protection method/program data to the public in enough of a fashion that the data has been seen in it's useable/unencrypted form.
Therefore, you have in some fashion made your data accessible to pirates.
Therefore, your data will be more easily accessible to the hackers than your legitimate audience.
Therefore, ANYTHING past the most simplistic protection method will end up treating your legitimate audience like pirates and alienating them

Or in short, the way the end user sees it:
Steal This Comic

Rateable answered 14/10, 2008 at 23:37 Comment(0)
G
14

Because it's a fixed defense against a thinking opponent.

The military theorists beat this one to death how many millennia ago ?

Garaway answered 14/10, 2008 at 23:47 Comment(1)
Which is why products that update usually do a security revamp on each revision.Mcfadden
C
12

Copy-protection is like security -- it's impossible to achieve 100% perfection but you can add layers that make it successively more difficult to crack.

Most applications have some point where they ask (themselves), "Is the license valid?" The hacker just needs to find that point and alter the compiled code to return "yes." Alternatively, crackers can use brute-force to try different license keys until one works. There's also social factors -- once one person buys the tool they might post a valid license code on the Internet.

So, code obfuscation makes it more difficult (but not impossible) to find the code to alter. Digital signing of the binaries makes it more difficult to change the code, but still not impossible. Brute-force methods can be combated with long license codes with lots of error-correction bits. Social attacks can be mitigated by requiring a name, email, and phone number that is part of the license code itself. I've used that method to great effect.

Good luck!

Cirillo answered 14/10, 2008 at 23:45 Comment(3)
I'd argue that copy-protection isn't "like" security, it IS security on alot of levels. Some more ideas for making things harder is to throw a few exceptions around early, check for attached debugger AFTER this, and other fun things like that. In the end though, everything can be reversed with time.Vashtee
We theorized back in the 90's that putting the customers credit card details in the software license would dissuade them for circulating it. What else does the seller know about the buyer that they really don't want anyone else to know? It's just escalating the conflict to taking hostages ( see my answer below)Garaway
@Tim -- Nice point, depending on your customers. For example at Smart Bear 95% of our sales are through purchase orders, so that doesn't work. But I like it!Cirillo
D
7

Sorry to bust in on an ancient thread, but this is what we do for a living and we're really really good at it. It's all we do. So some of the information here is wrong and I want to set the record straight.

Theoretically uncrackable protection is not only possible it's what we sell. The basic model the major copy protection vendors (including us) follow is to use encryption of the exe and dlls and a secret key to decrypt at runtime.

There are three components:

  1. Very strong encryption: we use AES 128-bit encryption which is effectively immune to a brute force attack. Some day when quantum computers are common it might be possible to break it but it's unreasonable to assume you will crack this strength encryption to copy software as opposed to national secrets.

  2. Secure key storage: if a cracker can get the key to the encryption, you're hosed. The only way to GUARANTEE a key can't be stolen is to store it on a secure device. We use a dongle (it comes in many flavors but the OS always just sees it as a removable flash drive). The dongle stores the key on a smart card chip which is hardened against side channel attacks like DPA. The key generation is tied to multiple factors which are non-deterministic and dynamic so no single key/master crack is possible. The communication between the key storage and the runtime on the computer is also encrypted so a man-in-the-middle attack is thwarted.

  3. Debugger detection: Basically you want to stop a cracker from taking a snapshot of memory (after decryption) and making an executable out of that. Some of the stuff we do to prevent this is secret, but in general we allow for debugger detection and lock the license when a debugger is present (this is an optional setting). We also never completely decrypt the entire program in memory so you can never get all the code by "stealing" memory.

We have a full time cryptologist who can crack just about anybody's protection system. He spends all his time studying how to crack software so we can prevent it. So you don't think this is just a cheap shill for what we do, we're not unique: other companies such as SafeNet and Arxan Technologies can do some very strong protection as well.

A lot of software-only or obfuscation schemes are easy to crack since the cracker can just identify the program entry point and branch around any any license checking or other stuff the ISV has put in to try to prevent piracy. Some people even with dongles will throw up a dialog when the license isn't found--setting a breakpoint on that error will give the cracker a nice place in the assembly code to do a patch. Again, this requires unencrypted machine code to be available--something you don't get if you do strong encryption of the .exe.

One last thing: I think we're unique in that we've had several open contests where we provided a system to people and invited them to crack it. We've had some pretty hefty cash prizes but no one has yet cracked our system. If an ISV takes our system and implements it incorrectly it's no different from putting a great padlock on your front door attached to a cheap hasp with wood screws--easy to circumvent. But if you use our tools as we suggest we believe your software cannot be cracked.

HTH.

Drais answered 22/3, 2011 at 21:35 Comment(7)
Agreed that this is very strong encryption. However, the question was more directed toward software only schemes. Custom hardware (#2) is going to make cracking vastly harder.Riggall
Thanks for the info. I wasn't really thinking in terms of custom hardware, but perhaps that was naive of me.Mcgruter
You can do all three with a software-only solution, but as UsAaR33 said, storing key gen in a dongle is vastly more secure than in software only. However, even with a software-only solution you can encrypt your code making reverse-engineering or algorithm theft quite difficult.Drais
"Theoretically unbreakable"? It is quite easy to prove that any copy-protection system is breakable (in theory). Practically unbreakable on the other hand is very much possible. It should also be noted that all (sufficiently large) software contains bugs. This means that theoretically unbreakable protection is often breakable in practice.Trueblue
I second Hjulle's point. I suggest you edit this otherwise excellent posting to remove the phrase "theoretically unbreakable". It made me almost stop reading immediately, as obviously that's not correct.Overcapitalize
This claim is provably false. Find a client of this company or one of the others that use similar technology. Find out what software products they protect with it. Find same on BitTorrent sites, cracked.Dynameter
Eric just so you know I don't do this anymore (work for different company/different domain space) so I'm not arguing with you. But the fact is with the hardware keys it is virtually impossible to create a generic app crack. I'm only making this comment because there is so much mis-information around copy protection in general.Drais
M
6

The difference between security and copy-protection is that with security, you are protecting an asset from an attacker while allowing access by an authorized user. With copy protection, the attacker and the authorized user are the same person. That makes perfect copy protection impossible.

Misdemeanant answered 16/10, 2008 at 21:59 Comment(0)
C
5

I think given enough time a would-be cracker can circumvent any copy-protection, even ones using callbacks to remote servers. All it takes is redirecting all outgoing traffic through a box that will filter those requests, and respond with the appropriate messages.

On a long enough timeline, the survival rate of copy protection systems is 0. Everything is reverse-engineerable with enough time and knowledge.

Perhaps you should focus on ways of making your software be more attractive with real, registered, uncracked versions. Superior customer service, perks for registration, etc. reward legitimate users.

Collis answered 14/10, 2008 at 23:46 Comment(1)
I like your reference to Fight Club. :-)Cirillo
A
5

Basically history has shown us the most you can buy with copy protection is a little time. Fundamentally since there is data you want someone to see one way, there is a way to get to that data. Since there is a way someone can exploit that way to get to the data.

The only thing that any copy protection or encryption for that matter can do is make it very hard to get at something. If someone is motivated enough there is always the brute force way of getting around things.

But more importantly, in the computer software space we have tons of tools that let us see how things are working, and once you get the method of how the copy protection works then its a very simple matter to get what you want.

The other issue is that copy protection for the most part just frustrates your users who are paying for your software. Take a look at the open source model they don't bother and some folks are making a ton of money encouraging people to copy their software.

Abie answered 14/10, 2008 at 23:49 Comment(1)
Agreed. Since stand-alone games used to make the majority of their profit in the period just after the release date, it seemed that game companies were going to just keep upping the ante with the pirates. I thought online gaming would get rid of these types of measures but now the game companies are using similar technology to prevent online cheating. So, the cycle begins anew.Mazer
S
5

"Trying to make bits uncopyable is like trying to make water not wet." -- Bruce Schneier

Copy protection and other forms of digital restrictions management are inherently breakable, because it is not possible to make a stream of bits visible to a computer while simultaneously preventing that computer from copying them. It just can't be done.

As others have pointed out, copy protection only serves to punish legitimate customers. I have no desire to play Spore, but if I did, I'd likely buy it but then install the cracked version because it's actually a better product for its lack of the system-damaging SecuROM or property-depriving activation scheme.

Sturmabteilung answered 16/10, 2008 at 22:42 Comment(0)
T
4

}} Why?

You can buy the most expensive safe in the world, and use it to to protect something. Once you give away the combination to open the safe, you have lost your security.

The same is true for software, if you want people to use your product you must given them the ability to open the proverbial safe and access the contents, obfuscating the method to open the lock doesn't help. You have granted them the ability to open it.

Tooth answered 14/10, 2008 at 23:54 Comment(0)
N
4

You can either trust your customers/users, or you can waste inordinate amounts of time and resource trying to defeat them instead of providing the features they want to pay for.

It just doesn't pay to bother. Really. If you don't protect your software, and it's good, undoubtedly someone will pirate it. The barrier will be low, of course. But the time you save from not bothering will be time you can invest in your product, marketing, customer relationships, etc., building your customer base for the long term.

If you do spend the time on protecting your product instead of developing it, you'll definitely reduce piracy. But now your competitors may be able to develop features that you didn't have time for, and you may very well end up selling less, even in the short term.

Needs answered 14/10, 2008 at 23:55 Comment(0)
F
4

As others point out, you can easily end up frustrating real and legitimate users more than you frustrate the crooks. Always keep your paying users in mind when you develop a circumvention technique.

If your software is wanted, you have no hope against the army of bored 17 year old's. :)

Foolish answered 15/10, 2008 at 20:38 Comment(0)
D
2

In the case of personal copying/non-commercial copyright infringement, the key factor would appear to be the relationship between the price of the item and the ease of copying it. You can increase the difficulty to copy it, but with diminishing returns as highlighted by some of the previous answers. The other tack to take would be to lower the price until even the effort to download it via bittorrent is more cumbersome than simply buying it.

There are actually many successful examples where an author has found a sweet spot of pricing that has certainly resulted in a large profit for themselves. Trying to chase a 100% unauthorized copy prevention is a lost cause, you only need to get a large group of customers willing to pay instead of downloading illegaly. The very thing that makes pirating softweare inexpensive is also what makes it inexpensive to publish software.

Detestable answered 16/10, 2008 at 22:34 Comment(0)
G
1

There's an easy way, I'm amazed you haven't said so in the answers above. Move the copy protection to a secured area (understand your server in your secure lab). Your server will receive random number from clients (check that the number wasn't used before), encrypt some ever evolving binary code / computation results with clients' number and your private key and send it back. No hacker can circumvent this since they don't have access to your server code.

What I'm describing is basically webservice other SSL, that's where most company goes nowadays.

Cons: A competitor will develop an offline version of the same featured product during the time you finish your crypto code.

Gurl answered 26/5, 2010 at 15:10 Comment(0)
I
1

On protections that don't require network:

According to notes floated around it took two years to crack a popular application which used similar scheme as described in John's answer. (custom hardware dongle protection)

Another scheme which doesn't involve a dongle is "expansive protection". I coined this just now, but it works like this: There's an application which saves user data and for which the users can buy expansions and such from 3rd parties. When user loads the data or uses new expansion, the expansions and the saved data contains also code which performs checks. And of course these checks are also protected by checksum checks. It's not as secure on paper as the other scheme but in practise this application has been half-cracked all the time, so that it mostly functions as a trial despite being cracked as the cracks will always miss some checks and have to patch these expansions as well.

The key point is, while these can be cracked, if enough software vendors used such schemes, this would overwork the few people in the warescene who are willing to dedicate themselves to those. If you do the maths, the protections don't have to be even that great, as long as enough vendors used these custom protections that changed constantly, it would simply overwhelm the crackers and the warez scene would end then and there. *

The only reason this hasn't happened is because publishers buy a single protection that they use all over, making it a huge target just like Windows is target for malware, any protection used in more than single app is a bigger target. So everyone needs to be doing their own custom, unique multi-layered expansive protection. The amount of warez releases would drop to maybe dozen releases per year if it takes months to crack a single release by the very best crackers.

Now for some theorycrafting in marketing software:

If you believe that warez provides worthwhile marketing value, then that should be factored in the business plan. This could entail a very very (too) basic lite version that still cost few dollars to ensure it was cracked. Then you'd hook in the users with "limited time upgrade cheaply from the lite version" offers regularly and other upselling tactics. The lite version should really have at most one buy-worthy feature and otherwise be very crippled. The price should probably be <10 $. The full version should probably be twice as much as the upgrade price from the $10 lite pay-demo version. eg. If the full-version is $80, You'd offer upgrades from the lite version to full version for $40 or something that really seems like killer bargain. Of course you'd avoid revealing these bargains to purchasers who went direct for the $80 edition.

It would be critical that the full version shared no similarity in code to the lite version. You'd intend that the lite-version gets warezed and the full-version will either be time intensive to crack or have network dependency in functionality that will be hard to mimic locally. Crackers are probably more specialized in cracking than trying to code up/replicate parts of functionality that the application has on the web server.

* addendum: for apps/games the scene might end in such unlikely and theoretical circumstance, for other things like music/movies and in practise, I'd look at making it cheap for digital dl buyers to get additional collectible physical items or online-only value - many people are collectors of stuff (especially the pirates) and they could be enticed into buying if it gains something desirable enough over just a digital copy.

Beware though - There's something called "the law of rising expectations". Example from games: Ultima 4-6 standard box included a map made of cloth, and Skyrim Collectors edition has a map made of paper. Expectations had risen and some people aren't going to be happy with a paper map. You want to either keep quality of produce or service constant or manage expectations ahead of time. I believe this is critical when considering these value-add things as you want them to be desirably but not increasingly expensive to make and not turn into something that seems so worthless that it defeats the purpose.

Intimidate answered 22/2, 2012 at 11:0 Comment(0)
V
0

This is one occasion where quality software is a bad thing, because if no one whats your software then they will not spend time trying to crack it, on the other hand things like Adobe's Master Collection CS3, were available just days after release.

So the moral of this story is if you don't want someone to steal your software there is one option: don't write anything worth stealing.

Ventriloquize answered 15/10, 2008 at 0:0 Comment(0)
G
0

I think someone will come up with a dynamic AI way of defeating all the currently standard methods of copy protection; heck, I'd sure love to get paid to work on that problem. Once they get there then new methods will be developed, but it'll slow things down.

The second best way for society to stop theft of software, is to penalize it heavily, and enforce the penalties.

The best way is to reverse the moral decline, and thereby increase the level of integrity in society.

Gilmer answered 15/10, 2008 at 0:8 Comment(2)
Please look up what influence the death penalty has on crimes: None. People don't break the law to piss you off, they are smart. Creating a law that 90% of the population will not follow will not get you anywhere.Olmstead
@Aaron You missed "and enforce the penalties." part. +1 to make up for -1 (I guess from you). And go for a trip to Switzerland, please.Intercourse
D
0

A lost cause if ever I heard one... of course that doesn't mean you shouldn't try.

Personally, I like Penny Arcade's take on it: "A Cyclical Argument With A Literal Strawman"alt text http://sonicloft.net/im/52

Displace answered 24/3, 2010 at 19:46 Comment(0)

© 2022 - 2024 — McMap. All rights reserved.