logoalt Hacker News

dehrmannyesterday at 10:56 PM4 repliesview on HN

> I must say, this copy protection mechanism seems a bit… simplistic? A hardware dongle that just passes back a constant number?

Seems like it was an appropriate amount of engineering. Looks like this took between an afternoon and a week with the help of an emulator and decompiler. Imagine trying to do this back then without those tools.


Replies

15155yesterday at 11:04 PM

Audience matters. Something intended to stop legitimate business consumers in a non tech industry requires substantially less sophistication than something built to withstand professional reverse engineers.

show 3 replies
bri3dyesterday at 11:09 PM

In fairness, the decompiler didn't work on the protection method :)

I think that both halves of the author's thesis are true: I bet that you could use this device in a more complicated way, but I also bet that the authors of the program deemed this sufficient. I've reversed a lot of software (both professionally and not) from that era and I'd say at least 90% of it really is "that easy," so there's nothing you're missing!

opinologoyesterday at 11:02 PM

Iremember doing exactly this kind of hack for a small telco in Bueno Aires. Extel. Around the year 2000.

In most cases it was not much more difficult than what OP described.

show 1 reply
cyanydeezyesterday at 10:59 PM

Yeah, my IT company bitshifts suspect files and provides the magic number.

The protection just needs suficirntly complex.