It doesn't matter if they crack the software or not to circumvent the checks, because a hash reset system in reality is a "binary" system meaning there are two parts to the software. The first part is the "client" on the computer, the second part is streamed to the client after the hash check is sucessful. It takes both parts for the software to operate. So it doesn't matter if they crack the client side or not to do away with or bypass the check, because without the check there will be no second part streamed and no second part streamed means no software operation. Even if they hack it some way to send a hash its very unlikely that thousands of copies of the software floating around pirated will be used on a computer with the same hash as the user who actually purchased the license. And even if they did manage to crack it to send the same hash as the license users some way or another the client file hash is going to change and thus no second part streaming.Trond wrote:Wow. So not only will your software cease working if you bring your laptop to somewhere else than your own home, you also can't take the software with you when you move. Or if you upgrade your computer. Or buy a new computer.SFSxOI wrote:All ur codz are belongz to uz
Seriously; You could lock the software use to a specific user/computer using a hash system which consists of a combination of file hash (to make sure the file is not altered) and computer hardware hash combined with the IP address. This requires you to set up a system on the web that reads and compares the hash each use which means communication across the internet, and coding in something that tells the user the hash has changed and they will need to contact you for a "hash reset" at which time you challenge them to verify their identitiy and licensing status. If the IP address changes the hash changes requiring a "hash reset" and if the IP appears in a different domain and geographic location its also a clue that the person is using a pirated version and you simply do not perform a "hash reset" so the software doesn't work.
And in reality, such a system will be cracked like any other system, by obtaining the full executable code (at some point it has to be on the user's computer) and disabling the check for server contact.
This is exactly the kind of policy which causes people to pirate software in the first place.If the person uses the software on two different computers, like a laptop with wireless to one ISP and a home computer with another ISP, they simply purchase two seperate licenses - one for each computer.
The IP check doesn't need to be used, its just an additional measure. This system can be made as tight or loose as the owner wants to make it. No, IP checks are not the type of policy that causes people to pirate software in the first place. What causes people to pirate software at its basis is simply plain old greed as they don't want to pay for it. Its a lie and a myth that people pirate for reasons of "testing", or because they don't like it and want to see first, or simply because the creator wants to be paid for their product just like anyone else who sells anything and the pirates don't think the price is fair, it comes down to one of the most basic of human characteristics plain old greed. Like I said, the IP does not need to be included but you just inadvertantly pointed out the very reason why it should be included.
He asked for ways, i gave one, and its one that places the control in the hands of the software creator/seller/Intellectual Property owner and removes it from the hands of the pirates. Its going to be the coming thing anyway, and in fact already exists in some forms but more draconian then this, for example the next generation of games (from some companies) will start using a binary hash system like this. In 15 to 20 years from now you will not be able to even boot a computer with internet access without permission from a big-content company somewhere for the software you have installed. If you think this is bad then wait till then. In fact this capability exists today in consoles which are a ready mass testing ground for this future capability. What do you think cloud computing it really about anyway, its about, and specifically designed for, big content Intellectual Property rights holders, sure it may have some bells and whistles to make it seem more useful like email and stuff, but you just wait and you will find out what cloud computing is really about. I gurantee you. The company I work for is already working on developing counter intrusion measures for securing such systems, and even have a lab test "cloud" system set up for testing and it works, you can't boot a single computer connected to it unless the "cloud" gives permission, these test computers have next-gen prototype hardware installed that asks for and needs this permission, you can't even play a purchased DVD that you already paid for without the cloud giving permission, for older computers connected without that comm to big content no internet access. Its coming, believe me. This is why all those outspoken non-intellectual property owners who wanted DRM didn't know what they were talking about, they thought it was about protecting rights-holders, in reality its about controlling computer users and control for profit.