#91
|
||||
|
||||
#92
|
|||
|
|||
Quote:
Quote:
Quite obviously, you won't be able to do so, and I don't think anyone can arguably disagree with that (without trolling). Last edited by mcp; 04-25-2013 at 21:44. |
#93
|
|||
|
|||
@mcp
You can not proof it because nobody knows which attacks appear tomorrow. Just suppose in 10 years quantum computers appear. And almost all current crypto would be trash. Years ago DES looks uncrackable. Nowadays it is weak. The same to RSA. Ten years ago RSA-512 was strong. Now it is weak. Could you make the RSA less or equal to 512 bits which we can not crack? Sure, you cant. Most algos add more rounds to be stronger or increase key sizes or other params. HE libraries are very rough. Limited in the operations to Add and Mul in most. Also, it is hard to imagine the use cases which help to protect applications. Could you describe any? To operate in HE you need both numbers encrypted with private key. To decrypt result you need also public key. Would you store both keys in the software? Or how do you plan to make protection? |
#94
|
|||
|
|||
Quote:
Quote:
Take for example the use case that you want to compute something which must not be revealed to the public, still the computation has to be made on every consumer's device, and the consumers must not know how the computations inner workings look like. Then again, the weak points of FHE are the input and output values: if these are to be used in other non-HE parts of the program, these clearly must be decrypted. As always in security, you have to be aware of the "attacker model": FHE per se cannot be used to create any kind of "unbreakable" protection, and no sane person would ever claim that. On the other hand, I strongly disagree with the statement that "everything made by man can be broken". That's too broad of a statement and is simply not true in general. |
#95
|
|||
|
|||
Sure, it can be. But nobody guarantees it will work after that or even be valid.
|
#96
|
||||
|
||||
Quote:
However, make a piece of software runnable only with a license file, protect the license file with an RSA 4096-bit private key and I guarantee you it will be broken and fully registered versions available within 24 hours. Same goes for if the license checking is built into a dongle. If you have access to the dongle, the software be made to work without it. I have done this many times for people who worry about the security of their software dongles. |
#97
|
|||
|
|||
How about Senselock and other dongles which are built on smart card technology?
|
#98
|
|||
|
|||
Quote:
|
#99
|
||||
|
||||
Hi mates,
How would you rank latest SolidShield? Thanks!
__________________
Ŝħůb-Ňìĝùŕřaŧħ ₪) There are only 10 types of people in the world: Those who understand binary, and those who don't http://www.accessroot.com |
#100
|
|||
|
|||
What's some modern software that uses it? It pretty much faded into obscurity after AAA games dropped it sometime over a decade ago
Did they develop an x64 protection? Sometimes it's a huge step back |
#101
|
|||
|
|||
It's pretty lame protection compared to today's standards. Can be cracked quite easily.
|
#102
|
|||
|
|||
I believe Safenet Sentinel LDK protection - its very hard to unpack files protected by this software and maybe few has ever to do it but I never know someone.
|
#103
|
|||
|
|||
True. Only the paid ones post the solutions these days for the Sentinel LDK. No free tuts!
|
#104
|
|||
|
|||
I think Wibu CodeMeter can also occupy a place,it can be the best one.
|
#105
|
|||
|
|||
It is the worst one in dongle. See how many codemeter apps are cracked and released on regular basis. I agree that it could be implementation problem in some cases, but still...
|
Thread Tools | |
Display Modes | |
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
When use "vendor defined encryption routines", how to set daemon related part? | bridgeic | General Discussion | 6 | 01-22-2015 11:35 |
Wlscgen: Are "Vendor Id" and "Developer Id" different ? | Numega Softice | General Discussion | 6 | 02-12-2007 18:12 |