Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Posting-Version: version B 2.10.2 9/3/84; site sesame.UUCP Path: utzoo!linus!philabs!cmcl2!seismo!harvard!talcott!sesame!slerner From: slerner@sesame.UUCP (Simcha-Yitzchak Lerner) Newsgroups: net.micro.pc,net.micro Subject: Re: Re: software protection - dongles & other gizmos Message-ID: <250@sesame.UUCP> Date: Mon, 5-Aug-85 10:26:16 EDT Article-I.D.: sesame.250 Posted: Mon Aug 5 10:26:16 1985 Date-Received: Sat, 10-Aug-85 05:01:52 EDT References: <433@othervax.UUCP> <1775@ecsvax.UUCP> <590@psivax.UUCP> Organization: Lotus Development Corp Lines: 56 Xref: linus net.micro.pc:4583 net.micro:10120 > In article <1775@ecsvax.UUCP> hes@ecsvax.UUCP (Henry Schaffer) writes: > > I could not do this if the program was > >keyed to a specific dongle which was used by many other > >programs and was in use with another cpu that day (or year.) > > Actually, to my mind, there is an even worse problem with > this type of protection scheme. What if I have purchased four or five > programs from different vendors each with its own dongle(or key disk), > unless I can somehow attach or install *all* of the dongles(disks) > simultaneously on the same machine I must continually swap dongles(disks) > every time I switch programs. This is utterly unacceptible if the > programs are frequently used in rotation(such as an editor and a > compiler). > -- > > Sarima (Stanley Friesen) > The ADAPSO keyring system holds multiple keys simultaneously. Since the designers of the ADAPSO system have to live with what they create, a LOT of thought went into making the system as transparent and unobtrusive as possible. For most users, they will buy a package, install the key in their keyring, shove it behind their computer and let it gather dust. Hard disks/LANs/RAM disks, will all be fully usable without restriction, and you can make functional backups to your hearts content. BTW: Because of the higher security offered w/ keys, some manufacturers will be setting up their disks to *encourage* distribution of copies. (In other words, if you try and run w/o the key, the disk will either go into a demo mode or allow you to run but not save or print your work...) Also, expect software returns to start being accepted, 30 day trial periods, legitamite rental of software. Also, software can now be sold at different prices for limited use. (Full price of unlimited use, discounts for 50 use keys or 6 month keys &c. Use your imagination to figure out what you can do with the capabilities of a key...) ============== A previous posting brought up the patching issue again. As previously stated, if complex program routines are executed in the key and not in the host CPU, patching will cause the software to malfunction. You say that you can reverse engineer the routines? Even when their are several random dummy paramaters going in and out? Even when the routine varies by a state machine? [FLAME OFF] -- Opinions expressed are public domain, and do not belong to Lotus Development Corp. ---------------------------------------------------------------- Simcha-Yitzchak Lerner {genrad|ihnp4|ima}!wjh12!talcott!sesame!slerner {cbosgd|harvard}!talcott!sesame!slerner slerner%sesame@harvard.ARPA