Question

I want to continue on my previous question: https://stackoverflow.com/questions/3007168/torrents-can-i-protect-my-software-by-sending-wrong-bytes

Developer Art suggested to add a unique key to the application, to identifier the cracker.
But JAB said that crackers can search where my unique key is located by checking for binary differences, if the cracker has multiple copies of my software. Then crackers change that key to make them self anonymous.

That is true.

Now comes the question: If I want to add a unique key, are there tools to shuffle (a kind of obfuscation) the program modules? So, that a binary compare would say that the two files are completely different. So they can't locate the identifier key.

I'm pretty sure it is possible (maybe by replacing assembler blocks and make some jumps).
I think it would be enough to make 30 to 40 shuffles of my software.

Was it helpful?

Solution

As it comes to software protection, nothing is safe and if somebody is really determined to crack your application, he probably will.

As for your question, there are packers/protectors that could achieve what you need. Here are a couple of them:

OTHER TIPS

Crypto Obfuscator has a feature which allows you to watermark your assemblies. The watermarks can be unique strings which are not directly visible/used in code. Each time a customer purchases, you can send a uniquely watermarked copy to the customer so that if a crack appears you know the origin.

Licensed under: CC-BY-SA with attribution
Not affiliated with StackOverflow
scroll top