Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The same goes for any copy protection. If you understand how it works, you can change the code to bypass it.

So it's "trivial" after you do the hard part. The clever thing is that it forces you to do the hard part without special hardware.



Not really. The PSX copy protection, for example, couldn’t be written by standard CD-R writers.


I'm talking about understanding how it works on a code level. You don't need to write the special disk out if you're patching the code, like this article does.


Yeah but you'll have to hunt for and fix the code wherever it is on every disk, which could be subtly or completely different between applications. "Recalculate track 9" is a simple program that would have worked on any Western Security DRM disk.


You're assuming it's always in track 9 in the same spot. What if it isn't? And what if different applications use slightly different obfuscation?

If we're assuming Western Security DRM is always in the same spot using the exact same method, why not compare it against some other type of copy protection that always puts the exact same checking code in the same spot? It would actually be easier to blot out the other type's code with NOPs than to recalculate obfuscated Western Security track-length tables.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: