| ▲ | dehrmann 6 hours ago | ||||||||||||||||||||||||||||
> I must say, this copy protection mechanism seems a bit… simplistic? A hardware dongle that just passes back a constant number? Seems like it was an appropriate amount of engineering. Looks like this took between an afternoon and a week with the help of an emulator and decompiler. Imagine trying to do this back then without those tools. | |||||||||||||||||||||||||||||
| ▲ | 15155 5 hours ago | parent | next [-] | ||||||||||||||||||||||||||||
Audience matters. Something intended to stop legitimate business consumers in a non tech industry requires substantially less sophistication than something built to withstand professional reverse engineers. | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
| ▲ | bri3d 5 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||
In fairness, the decompiler didn't work on the protection method :) I think that both halves of the author's thesis are true: I bet that you could use this device in a more complicated way, but I also bet that the authors of the program deemed this sufficient. I've reversed a lot of software (both professionally and not) from that era and I'd say at least 90% of it really is "that easy," so there's nothing you're missing! | |||||||||||||||||||||||||||||
| ▲ | opinologo 5 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||
Iremember doing exactly this kind of hack for a small telco in Bueno Aires. Extel. Around the year 2000. In most cases it was not much more difficult than what OP described. | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
| ▲ | cyanydeez 6 hours ago | parent | prev [-] | ||||||||||||||||||||||||||||
Yeah, my IT company bitshifts suspect files and provides the magic number. The protection just needs suficirntly complex. | |||||||||||||||||||||||||||||