[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Digital Cash



: : Let me make a point here: I run an Amiga, and Amiga games do go 
: to town on copy protection. They generally rip the OS out of memory, and 
: install a custom one, do custom formats of the disk (as in the structure 
: is normally unreadable) and have further hard protection such as laser 
: holes, etc.

Listen, trust me, I know about this stuff, OK.  You're talking to the
guy who designed a locked-motor dual disk drive for doing direct analog
magnetic copies straight from head to head.  (When I was working in the
protection area for Acorn I mean - I was never a cracker, honest guv ;-) )

We used to hack our own protection at Acorn to see how good it was.
I've spent many contemplative hours pushing pins into floppies to
force bad sectors in exactly the right places...  I tell you though,
that sort of stuff is trivial compared to factoring the product of
two even medium-sized primes...

: : This is not kids' stuff - this is serious, and these people are 

Of course it's for kids.  I know these guys.  I never met one who was over 21.
It's just one of those hormone things that you give up when you discover
women.  (Or men as appropriate)  The only cracker I can think of who kept
up his skills after the age of 21 was Jeremy 'Jez' San, and he just did
it because he was working for Acorn on copy-protection schemes as a paid
job, which isn't the same thing at all.  Mostly they're around 18, plus
or minus.  A lot of the kids I knew who used to do this (back when I had
to keep up with the technology) were in high-school.  One of the best I
knew was a 14-year old.

: carcking it within hours. Let them loose on any program with their own 
: hardware, and they are capable of doing some quite serious things to the 
: rights of the author.

Sure, but what's that got to do with cracking crypto?  If you can't see
the difference between STO protection schemes and mathematically hard
algorithms, ...

Don't let your hero-worship blind you to reality.  No amount of skill
in disassembling or knowing the CRC tricks of a 1771FDC, or the six different
versions of an 8251, is going to help in breaking a secure crypto scheme
or something derived from one, like a secure e-cash scheme.  It's a
*completely* different set of problems.

(Oh - on disassembling - one of the tricks we used to get round the stuff
that was used to stop debuggers being able to place breakpoints was to
run in a completely simulated machine.  The program *could not tell*
that it wasn't running live on real hardware.  We'd do this stuff right
down to the level of scheduling the data arriving off the disks - some
schemes would do sneaky stuff like have the cpu execute a long stream
of INC instructions, and get hit by an int when the data arrived, and
use the value of the incremented register to check that the data had
arrived at *exactly* the right time conforming to the sneaky way it had
been written to disk.)

Acorn's R&D division knew what they were doing in the protection area
despite some laughable protection on the games side by Jez and the boys
from Acornsoft - we actually did a design review and costed out the
expense of doing our own DES chips for a dongle.  Fortunately we never
went down that route... (I'm not a fan of dongles as a substitute for
proper licensing arrangements)  We also came pretty close to putting
serial numbers in our CPUs, on-chip.  We decided against it in the end
for the same reasons we decided against dongles... it just caused *way*
too much customer ill-feeling. (For instance, if your CPU died and had
to be replaced, suddenly your mission-critical CAD package would stop
working...)

G
PS It's because we looked into doing our own DES chips in quite some
detail that I've always taken it for granted that Wiener's cracking
engine was not only possible but probably existed.  By our own back
of the envelope calculations in the early 80's, these machines were
feasible then.