Jump to content

  • Log In with Google      Sign In   
  • Create Account


Member Since 18 Nov 2012
Offline Last Active Oct 05 2014 03:55 AM

Posts I've Made

In Topic: Advertisement in game

04 April 2014 - 08:53 PM

Many thanks,
Lol, it seems frequently death is good for ads

In Topic: How to set last active in profile to private?

03 August 2013 - 07:54 PM

many thanks

In Topic: Art skill learning?

24 March 2013 - 04:28 AM

Thanks, everyone

In Topic: Copyright protection, USB dongle?

11 December 2012 - 04:18 AM

I am looking into your idea

Many thanks for the insight an helpful info

In Topic: Copyright protection, USB dongle?

10 December 2012 - 09:51 AM

Thank all,

The reason server-based games are a bit more "secure" (though plenty of people still hack the client and server is still vulnerable) is because you own the computer the server is running on (and thus have a great deal of control over it). As soon as you put the server on the player's computer (whether it's a USB dongle or not), you immediately take away that advantage and it's probably just as easy to hack and crack as any other.

I don't know how iphone is jail broken, maybe their exploited software fault, but in microprocessor I haven't any case is hacked. The only method I know is take off IC's case, using microscope and UV light to read the state of the registers of the IC which only possible in lab condition and require expert skill.

I imagine a dedicated hacker could still bypass a dongle through emulation. Though it would be pretty difficult and probably not worth it. Commercial forensic software such as EnCase use dongles for this exact purpose.

This is the problem which I am finding the solution.
While I believe the microprocessor is very hard to hack to know the algorithm or the encrypted key store in it, but if dongle only returns simple value like true of false to allow the software to run, it can be easily patched though emulation

Even though, the hacker still can not know the true algorithms and keys in dongle, so I am leaning to the idea of using random encrypted return value each time, which can not be emulation. But then the hacker can hack directly to the software to bypass checking step. So I think the dongle must return encrypted critical data which require engine to run, e.g parameters of functions..

Is there any software used similar method? Or any idea?


Just focus on making great software instead, good software sells, bad software don't, DRM is primarly useful to prevent second hand sales or to protect a highly anticipated title on launch. (If the pirates are willing to wait a few days/weeks extra to play your game any DRM you implement will be worthless).

Hacking protected devices are doable even without software exploits, (Google for mod-chips for older consoles), on devices like the iPhone it just isn't done because doing so would "ruin" the appearance of the device(and exploiting the software is easier anyway). the problem is that you still need to store the instructions that your dongle should run somewhere and it isn't that difficult to remove and read a memory chip.

Dongles also force you to use physical distribution of your software, which today will result in a far greater reduction in sales than piracy can manage.

Thank you, I forgot modchip.

I work mainly in hardware, and try to find a way to sell my hardware, so please spare me if I concentrate on hardware solutions.

Well, I don't know how people hacked hardware and made modchip, but IMO, they must exploited unencryped parts, e.g communication between ICs in the system. IMO, directly hacking encrypted communication is not possible or my security knowledge has something wrong. In case everything is inside an simple IC then there is no way to hack it (reading very very hard). If I was wrong, please show me the right way.

And console systems like Xbox 360 and PS3 mainly distributed their products via physical discs, am I right? I am trying to bring a similar solution to PC systems. Also, if I was wrong, please point out for me