I'd be curious to know how well simply pass protecting the stacks does. Given 
the "hacker" doesn't know the key that was used for the encryption, it 
shouldn't be possible. 

Bob S


> On Oct 22, 2019, at 07:46 , Tom Glod via use-livecode 
> <use-livecode@lists.runrev.com> wrote:
> 
> JB, of course thats true, its just a matter of how long it takes and how
> skilled the cracker must be.  Its definitely not a reason not to try.
> 
> Kee, that sounds like quite the scheme.... a self-destructing stack.  My
> initial instinct is to create some trap using hashing also.
> 
> Thanks. :)
> 
> On Mon, Oct 21, 2019 at 11:03 PM kee nethery via use-livecode <
> use-livecode@lists.runrev.com> wrote:
> 
>> My wife built a Hypercard stack standalone that was protected by a dongle.
>> But, every call to the dongle was something you could search for in the
>> scripts. So she had scripts that did hashes of the scripts that talked to
>> the dongle. And she had scripts that did hashes of the scripts that checked
>> the hashes of the scripts …
>> 
>> Plus, she broke up the calculations into various sections of other code.
>> When a script noticed stuff was being altered, it would start erasing stuff
>> in the app stack. And it would look for Hypercard itself on their disk and
>> start erasing stuff in it. It would hold on as long as possible doing as
>> much damage as possible.
>> 
>> Setting the code to do all this protection was a carefully scripted
>> process because one false step and it would self destruct and damage her
>> Hypercard. It was pretty obvious to me when that happened because the
>> cursing would be rather loud and prolonged.
>> 
>> She’d do things like add up all the chars in a script, do a modulo on that
>> number, and then go to script ID <that answer> to execute a line of code in
>> that script.
>> 
>> I’m sure someone could have eventually gotten past all that stuff but
>> don’t think anyone ever did.
>> 
>> ------
>> 
>> All that said, shareware authors would routinely hang out on crack sites
>> and seconds before releasing their app, they would post a crack. No one
>> wants to be the second person to crack an app so the author would be the
>> only crack. That crack would allow someone to use the app for some period
>> of time (months) and then it would develop some kind of error. Users would
>> call in for support on XYZ error and the answer was, the more recent
>> version fixes that. It’s a simple upgrade, here’s the URL for users with
>> this error. And those folks would become paid users.
>> 
>> Kee

_______________________________________________
use-livecode mailing list
use-livecode@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your subscription 
preferences:
http://lists.runrev.com/mailman/listinfo/use-livecode

Reply via email to