[net.micro.mac] copy protection

tdn@cmu-cs-spice.ARPA (Thomas Newton) (01/31/85)

Claiming that copy-protection is equivalent to "buzzer-gizmos" on shirts is
patently bogus.  The "buzzer-gizmos" come off after you buy a shirt, and do
not then interfere with the normal use of the shirt.  Copy-protection *does*
interfere with the normal use of a piece of software, because it

    (1) Prevents the user from making backups
            The section of the U. S. Copyright Law that protects
            software explicitly states that it is legal for the
            purchaser of a piece of software to make backup and
            archival copies for his/her own use.

    (2) Makes it *extremely* risky for the user to customize his/
        her working disk (since the working disk IS the original,
        you can't afford to take chances and customize the menus,
        install new DAs using some buggy utility like ResEdit or
        RMover, install a RAMDisk in the system file, etc.)

How often do people want to backup and customize their Mac software?  I keep
backups of all the major programs I have purchased that aren't copy-protected
(MacWrite/MacPaint, Microsoft BASIC, MacTerminal, etc.) and of the protected
programs that I have been able to backup.  I have also customized several of
the programs that I normally use:

    1) The version of MacTerminal on which I am typing this bboard
       post has a modified version of the "standard" MacTerminal font
       that I find much more readable.  The MacTerminal documents which
       I normally use contain resources to make the OPTION key act like
       the COMMAND key, and to make the "~" character easier to type.

    2) The version of MacPaint which I normally use has command keys
       corresponding to *every* menu item.  The most useful new keys
       are the ones corresponding to the "invert" command and various
       "flip" commands -- since I don't need to move the mouse out of
       the drawing window to invoke them.

    3) My System files contain various assortments of fonts and DAs.
       If I think that installing a particular DA could be risky, I
       install it on a backup of the disk, then move the changes back.

I barely tolerate copy-protection on games.  I absolutely will not tolerate
it on utility/development software -- all of the people marketing protected
C compilers can forget about ever getting my money.

                                        -- Thomas Newton
                                           Thomas.Newton@cmu-cs-spice.ARPA

jss@sjuvax.UUCP (J. Shapiro) (02/09/85)

[Aren't you hungry...?]

	My biggest gripe about copy protection is that it makes consolidating
backups difficult.  Copy protection schemes like that used by Manx software
(a scratch on the disk) are ok in that even if the disk goes bad the
scratch is still present, they provide *two* key disks, and they will
replace a bad one free of charge. (They also set it up so that you only
need the key disk at startup/reboot).

	I have yet to meet any scheme that Copy II Mac won't beat. My major
complaint is the cost of my archive copies.  I have $175 worth of disks on
my desk (at $35 a box), and that is just too damn many to be screwing
around trying to consolidate copy protected software (a dubious practice at
best). I know computing is expensive, but why make it worse than it need
be?

Jon Shapiro
Haverford College

gus@Shasta.ARPA (11/13/85)

> > Here are some program cracks for various Macintosh applications.
> > ...etc.
> > 
>   [ Suggestions for beating copy protection schemes were here ]
> 
>  Hmmmmm.  Seems to me that this kind of thing is slightly innappropriate
> for the net.  Besides, Sonny would never condone it.  And by the way,
> there is no need to 'beat' "Griffon Terminal"(sic), since it isn't copy-
> protected any more.
> 
> Scott Gillespie
> Reed College
> 

I don't see why the original article was inappropriate. True, I did expect
it to cause some conmtroversy.

net.anything.anything is a public forum where people can share information
and help solve other people's problems. Copy protection is a problem which
must be solved. Many programs are very much hampered by the mindless
placement of copy protection, presumably to hamper piracy. Developers who
use copy protection are only fooling themselves. Judging from experience of
recent months, it will take at most one month before someone (usually 
Central Point Software) has defeated the protection system. Within another
month, anyone who would care to have a copy of the latest Copy II Mac
already has it. (Jazz lasted 2 weeks!)

From then on, the copy protection no longer protects the vendor, it actually
hurts him by
   1) Making the program less usable
   2) Generating animosity on the part of users toward the company
   3) Making programs more fragile 


I will now take these three points individually


1) Making the program less usable.

    Programs are made less usable in at least three ways

   1) Inability to fully use a hard disk
   2) Inability for expert users to customize their environment
   3) The high probability that protected programs will not be compatible
	with system upgrades.

    The current trend in Microcomputers is that more and more people are
using hard disks. This problem has perhaps affected IBM PC owners much
earlier than it has Macintosh owners since the XT has always had a hard
as standard equipment. Developers who still insist on protecting their 
programs have resorted to one of four methods.
   1) Not allowing hard disk use at all
   2) Configuring the program for a specific configuration when the
	program is transfered to hard disk
   3) Requiring that a "key" disk be left in the floppy drive.
   4) Writing non-standard information on the hard disk itself.

    Choice 1 is clearly unacceptable as it defeats the entire purpose of a
hard disk.

    Choice 2 is unacceptable because the program becomes useless when
hardware is upgraded. This may not be apparent to a user (not mentioned
in the documentation, or burried in fine print) until it is too late.

    Choice 3 is unacceptable in that it still requires use of floppies when
otherwise, the system would be self-contained. This is only agravated by
recent schemes which only require the key disk after 'n' invocations. A
user, then, who did not originally install the program could suddenly get
a weird 'please insert disk' message at any time which he did not know
anything about!

    Choice 4 is unacceptable because other files besides the protected
program also live on the hard disk. This means that any bad marks would
interfere with the work of programs such as hard-disk restore and backup
programs which assume that the disk is correctly formatted. (or want to make
it that way!) Also, this scheme assumes direct access to a hard disk and the
file system. Although this may work for IBM PC's, this, in general, will not
work in a Macintosh environment where a hard disk is a separate subsystem
which varies from vendor to vendor.


    The Macintosh environment is a rich one allowing for many variations in
which individual users work with their machine. One of the most common
variations is deciding what fonts and desk accessories reside on the system
disk. A copy protected program makes these modifications a risky business at
best since it requires that such modifications be made on the master disk.
Programs such as switcher are made extremely clumsy to use when swapping
between two or more copy protected programs. Programs such as RAM disks are
un-usable since it is usually the applications, and not the data files that
you want to place on a ram disk. Disk cache programs usually flush the entire
RAM resident disk block information as soon as a disk is ejected, even if
only temporarily in order to insert a key disk. While many of these problems
are circumventable, they do pose a hefty inconvenience to the user.


    Copy protection systems often have to make assumptions about underlying
hardware and system software, which would otherwise be shielded by the
underlying operating system. Thus when the system is updated, many of these
assumptions no longer hold true. This situation occurrs every time Apple
updates the Apple II ROM's. The first programs to be incompatible are those
that checksum the ROM and thus fail. This creates large inventories of un-
usable software on dealers' shelves. While incompatibilities may exist for
other legitimate reasons, a large number are caused by copy protection.
    This situation is about to occurr again as Apple is releasing the new 
hierarchial file system. Pat Dirks of Apple Computer spoke at the Stanford 
Mac Users Group Developers Subgroup meeting last Thursday (11/1) to talk
about the HFS. He brought with him a list of the applications that Apple
had tested for HFS compatibility. A large number of those that had failed,
and certainly, the single most important reason, was copy protection.



2) Generating animosity on the part of users toward the company

    This is largely a subjective issue. This has largely to do with prople
not buying products from a particular company simply because those products
are copy protected. Certainly copy protection cannot help a software review.
Most recent reviews devote at least a few sentences to the way a program is
protected, and may even go into great length describing how the protection
impeded their worek with the product. I am glad to have had a part in
improving this situation in at least one case. The fact that the current
version of the TMON debugger by TMQ software is un-protected is a direct
result of a review that I posted on net.micro.mac several months ago. Strong
opposition from the early alpha testers of the Reed College/Metaresearch
Rascal package caused all versions after the initial release to be
unprotected. Manx software has finally decided to do away with their copy
protection in the next release. They also publicly announced that they would
provide a patch over the phone to all current users describing how to defeat
the existing system. Many companies are advertising the fact that their
program is not copy protected. The list goes on and one about case studies
where it is (or was) simply to the companie's dis-advantage to copy protect
the software.

3) Making programs more fragile.

Any reasonable manual for a major business software product suggests that
you back up your data disks regularly. This is good and sound advice. They
don't, however, suggest that you back up the master disk, for obvious
reasons. Everyone who has been around computers for a while knows theat
magnetic media (disks) can ware out or otherwise lose valuable data.
Copy protected disks are subject to this same problem. Most companies have
a disk replacement policy which allows you to obtain a replacement for
a bad disk. This generally requires that you mail in the old disk, along with
a fee, to obtain a single new backup disk. In the meantime, you have to
wait until the new disk comes back. Some companies even provided an extra
backup disk with the same information as the original so that you still
have at least one working copy while the other is 'out for repair.'
Unfortunately, hardware errors are such that when one disk becomes unusable,
there is a good chance that this may occurr on another disk. This is
compounded by the fact that many programs WRITE to the protected master
disk. This subjects the disk to destruction due to software errors, which is
a much more common problem. Finally, the "two disk" packaging is generally
available for the more expensive software packages. Medium and low-cost
programs generally do not have this 'feature.'



There is one instance, however, where copy protection is permissable,
however, and which may actually INCREASE the value of the product. This is
in the case of games. Generally, games do not require back-up dtat disk,
and do not make effective use of a hard disk, nor do they really need any
extra utilities such as disk caches and ramdisks. The reason why copy
protection is desireable in a game, however, is that when you buy a protected
game, you buy two games for the price of one! The first game is the one
shown on the front cover. The second is trying to break the protection
system! 
    The analogy between games, especially adventures, and protection
systems goes a very long way. Copy protection has gone far beyond simply
making a program un-duplicatable by normal means. Those people installing
the protection system have to guard against attacks from various directions.
The first is bit copy programs such as Copy II Mac. In this case, the 
solution is to create stranger and stranger disk formats which are not
correctly interpreted by the latest version of the Central point product.
The second direction of attack is simple "crack" lists like the message that
prompted this reply. This is solved by requiring such 'cracks' to be
extremely long by providing multiple checks and checksums in the code. The
third direction comes from user who would go in and remove the copy
protection themselves. 
    This is where the true 'game' quality comes in since
at this point, copy protection becomes a duel between two expert
programmers: the one creating the protection system and the one removing it,
just like a plyer tries to solve an adventure created by its author. In both
cases, there is a guaranteed solution, but that solution may be arrived at
by gathering clues, and making logical deductions to solve puzzles. In the
case of an adventure, the 'solution' is carefully planned out by the author
so that there are just enough clues to make the game possible to win at. In
the case of protection systems, the "solution" is the path that the program
takes when running from the original disk. If this did not exist, the
program would never run. Both can have red harings and traps to confuse and
slow down the player. In each case, it is the author's job to make the
solution as difficult to arrive at as possible.
    No copy protection system is un-beatable. This has been born out time
and time again by so-called 'uncopyable' programs. No matter how many levels
of encryption there are in the code, there is always a solution. It becomes
a matter of pride for someone removing a protection system to complete his
work and not give up in midstream. Such system can thus only thwart the
efforts of novices but not of experts. Both sides have certain advantages.
While the creater has the advantage of having the full source code
available to him, and knowing the state of the machine at all times, the
defeater has the second law of themodynamics behind him, in that it is
easier to destroy something than to create it. The defeater exploits
weaknesses in the system that he might find that the creater might not have
thought of. 
    By this time this issue of copy protection has transcended all issues of 
piracy, which after all, which is what protection is supposed to prevent.
Whatever the copy protection defeater's motives, he is certainly not going
to change his mind about anything after he has defeated the protection 
system. Only his morals can decide that.
    It thus may or may not be easy to thwart the efforts of would-be pirates
by both making the program un-copyable Copy II mac, and by requireing that
any patch be extremely long, but is impossible to thwart the efforts of those
who have set their mind to defeating a protection system. Thus, there
comes a point of diminishing returns after which ANY level of protection
is no longer helpful, if not detremental because of the increase in code
size required to support the copy protection, the time that it takes to
execute it and perhaps most important for companies involved, the hours
required to create it. This may translate into several thausands of dollars
or many man-hours of employee time, depending on whether the protection
system is done in house or out.
    If the situation persists in the direction that it is going today, copy
protection will become a more and more expensive proposition. It has proven
easy to defeat the protection systems of programs which have used similar
methods. Once one is defeated, the others become much easier, if not trivial
to break. It has also proven easy to defeat systems which were applied by
someone not directly involved in the creation of the program. "Drop-in"
protection systems which make few assumptions about the host program are as
easy to remove as a parasite which clings to its host by only a few points
instead of getting inside. Companies will either decide that enough is
enough and that copy protection is simply not worth all of its shortcomings,
or they will simply pass the higher and higher cost of such protection to us
users.
    Hardware protection systems that use un-copyable 'keys' which are hooked
in to the computer through one of various i/o ports solve the "fragile disk"
and hard disk problems by making the key uncopyable instead of the disk. All
other problems still exist. Additionally, the increased cost of the key and
"key ring" may make this scheme impractical for all but the most expensive
software packages.

    So far, I have only said negative things and have provided no positive
ideas. I believe that I ought to end this message with a positive suggestion;
an idea which software publishers may not have thought about as an
alternative to "hard" copy protection: Soft protection. I will write this
idea in Macintosh terminology, but the general scheme should be applicable
to other machines as well. Here is how it works.
Lets say that you want to publish a program called "Fantasic". There will be
two files on the disk: "Fantastic" and "Fantastic Copyright notice." Both
are executable programs. Both are clearly visible on the desktop. Niether
is copy protected, and there are no hidden keys on the disk. The program is
totally copyable and movable to a hard disk. The master disk need only be
used once, and then put away, except for emergencies. The "Fantastic" program
is the main program to be run. The "Fantastic copyright notice" program
simply displays a single screen stating that this program is copyrighted and
that it is illegal to copy it for anything other than your own personal use,
you being the original purchaser. The screen also describes the material
advantages of owning a legitemate copy, such as customer support and free
or low-priced updates. Now here is the interesting part: "Fantastic" 
will NOT run unless "Fantastic copyright notice" is also on the
disk, and in the same folder as "Fantastic." This, program-wise, can easily
be done. I will not go into details how. Just suffice it to say that it
would take only a trivial amount of code. (Much less than the text of the
copyright notice.) The theory behind this scheme is that every time that you
launch the program from the finder, you also see the copyright notice
program. You may choose to ignore it, but it is always on your disk nagging
at you if you indeed have accepted a pirated copy. Some people will never
accept or give out pirated software. You don't have to worry about those.
Others will never buy something tat they can otherwise get a hold of by
copying. There is not much you cando about those because any protection
system will be broken sooner or later (but probably sooner). The people that
you need to worry about are those in-between folks who are undecided on the 
issue. These are the people who you could gently sway or nudge in your
direction. The general philosophy is to get people with a carrot instead of
a stick. 
    This scheme is certainly not foolproof, technically.
A user may launch "Fantastic" from either the minifinder, or may 
open a "Fantastic" document. and thus not be "reminded" by th
e copyright-notice file. However, requiring that it be in the 
same folder as "Fantastic" would probably make the user see it
often enough assuming that much of the time that the Mac is used is spent
in the finder.
    Nothing should be done to antagonize the user. This includes placing
page after page of threatening legal text in the copyright notice file
(a la smoothtalker) or requiring that the notice be read after every n'th
invocation of the program. Everything should be done to give the impression
that the publisher is there to help legitemate owners.
    This must certainly be considered an experimental solution. I make no
guarantees that it will either help or hinder sales compred to a completely
protected or un-protected program. However, like most experiments, they
must be tried out to see if they work.

Copy protection is a sticky issue in today's software market. Claims by
software makers that it increases sales by disallowing illegal copies are
dubious. Meanwhile, users have to make due with a program hampered to
various degrees by it. Protection systems themselves, as they become more 
sophisticated, become games played between the creators and defeaters of 
protection systems. On the other hand, there are alternatives to copy
protection which may achieve the same results in less brute force ways.

I will be speaking on copy protection at the next Stanford Macintosh
Users Group Developers meeting next Thursday, November 21, in Polya 111,
(Turing auditorium) on the Stanford campus at 7:30pm. 
Anyone in the San Francisco Bay area is welcome to come.

							Gustavo A. Fernandez

murlocker@water.UUCP (M. Urlocker) (11/14/85)

> > > Here are some program cracks for various Macintosh applications.
> > > ...etc.
> > > 
> >   [ Suggestions for beating copy protection schemes were here ]
> > 
> >  Hmmmmm.  Seems to me that this kind of thing is slightly innappropriate
> > for the net.  Besides, Sonny would never condone it.  And by the way,
> > there is no need to 'beat' "Griffon Terminal"(sic), since it isn't copy-
> > protected any more.
> > 
>
> There is one instance, however, where copy protection is permissable,
> however, and which may actually INCREASE the value of the product. This is
> in the case of games. Generally, games do not require back-up dtat disk,
> and do not make effective use of a hard disk, nor do they really need any
> extra utilities such as disk caches and ramdisks. The reason why copy
>  etc...

I disagree!  I bought Sargon III and later a hard disk and discovered I
couldn't get Sargon to work with it.  Once you get used to the speed and
convenience of a hard disk, you really don't want to go back to the 
hassle of booting a floppy.  Moreover the copy protection can inhibit
the use of things like switcher or ram disks.  With the performance of
most software on the mac, developers should *encourage* the use of ram
disks, caches, etc, because it makes the product perform significantly
better, leading to more satisfied customers.

I could backup Sargon with CopyII Mac, without difficulty, (so could any
pirate!) but I couldn't get it legitimately on the hard disk until the
"crack" was posted.

I think it is the duty of every software vendor to supply a means of 
installing the software on the hard disk without requiring insertion of
the master floppy.  I won't buy *any* program that cannot be used with
my hard disk.

						mark

ins_adsf@jhunix.UUCP (David S Fry) (11/16/85)

     I just wanted to say that I agree with most everything Gustavo
Fernandez had to say in article 1173.  Recently debate about copy protection
has been a hot topic in computer magazines, and it seems as though a
solution must be found.  One certainly understands that a developer doesn't
want his creation to be stolen, but when companies like Lotus and Microsoft 
sell software for $500-600, it's hard to be sympathetic.

    The most simplistic answer, of course, is to not copy protect anything.
I even have two friends, former die-hard pirates that would copy anything
they could, who now refuse to break the copyright notice of any un-copy-
protected program; protected software is still fair game to them.  If this
was practiced more often, they feel, developers and users could live happily.

                                              David Fry
 

rupprech@bbnccv.UUCP (Wolfgang Rupprecht) (11/17/85)

	I don't want to come across as a believer in copy protection,
I'm not.  (I also think that software houses often let greed play too
large a role in setting their prices. They could undoubtably stop a
lot of copying by lowering their prices.)

	Something that I have been toying with is another type of
'soft' protection. A software company could inbed unique serial
numbers in the software AND register these numbers at the time of
sale. The serial number could be done in several places, each time
encrypted in a different way. (Or better yet, linking subroutines in a
different order in each copy, with the serial number being the order
of the routines and linked in variables.  This would make it VERY
difficult to erase the serial number!) It wouldn't prevent people from
coping it. It would only make them think twice before they gave
somebody a program that COULD be traced to them. Again, it would be
possible to "file the engine block" in hopes of removing the tell-tale
serial numbers, but the nagging fear that you might have missed one,
and could be sued for damages for fathering hundreds of illegal copies
would undoubtably stop many. 

	What does the net think? 

				-wr
-- 
wolfgang rupprecht
{harvard, ihnp4, decvax}!bbnccv!rupprech
rupprech@bbnccv.arpa

brian@ut-sally.UUCP (Brian H. Powell) (11/18/85)

> 
> 	Something that I have been toying with is another type of
> 'soft' protection. A software company could inbed unique serial
> numbers in the software AND register these numbers at the time of
> sale. The serial number could be done in several places, each time
> encrypted in a different way. (Or better yet, linking subroutines in a
> different order in each copy, with the serial number being the order
> of the routines and linked in variables.  This would make it VERY
> difficult to erase the serial number!) It wouldn't prevent people from
> coping it. It would only make them think twice before they gave
> somebody a program that COULD be traced to them. Again, it would be
> possible to "file the engine block" in hopes of removing the tell-tale
> serial numbers, but the nagging fear that you might have missed one,
> and could be sued for damages for fathering hundreds of illegal copies
> would undoubtably stop many. 
> 
> 	What does the net think? 

     Nice idea, but this makes the duplication part of production non-trivial.
If you have to relink the program for each disk produced, imagine the time
and resources involved.  SLOW.  Duplication is slow enough.  Vendors want
the product out fast.
     Most companies would rather not suffer the expense of complicated copy-
protection schemes.  (Remember, you not only have to generate the serial
numbers, you have to keep track of them when they are sold.)
     Also, the registration would be hard to enforce.  Every computer store
has to tell every computer salesman that your piece of software must be
registered.  Seems like somebody would forget, or just decide it's not worth
it.


Brian H. Powell
		UUCP:	{ihnp4,seismo,ctvax}!ut-sally!brian
		ARPA:	brian@sally.UTEXAS.EDU

		 U.S. Mail:		 Southwestern Bell
		P.O. Box 5899		345-0932
		Austin, TX 78763-5899
					 AT&T
					(512) 345-0932

mazlack@ernie.BERKELEY.EDU (Lawrence J. &) (11/19/85)

>	I don't want to come across as a believer in copy protection,
>I'm not.  (I also think that software houses often let greed play too
>large a role in setting their prices. They could undoubtably stop a
>lot of copying by lowering their prices.)

Actually, I think that developers should be able to have some form of
copy protection, they develop a product and should be paid for it.  What
annoys me is not being able to backup my OWN copies or transfer them to
hard disk.  How to solve this problem, I don't know.

>	Something that I have been toying with is another type of
>'soft' protection. A software company could inbed unique serial
>numbers in the software AND register these numbers at the time of
>sale. The serial number could be done in several places, each time
>encrypted in a different way. (Or better yet, linking subroutines in a
>different order in each copy, with the serial number being the order
>of the routines and linked in variables.  This would make it VERY
>difficult to erase the serial number!) It wouldn't prevent people from
>coping it. It would only make them think twice before they gave
>somebody a program that COULD be traced to them. Again, it would be
>possible to "file the engine block" in hopes of removing the tell-tale
>serial numbers, but the nagging fear that you might have missed one,
>and could be sued for damages for fathering hundreds of illegal copies
>would undoubtably stop many. 
>

I suspect that this wouldn't be very effective as I don't believe that
prosecution against or law suit against individuals is about to happen.
If it doesn't happen, such a scheme wouldn't be effective.  Sigh. Sob.

...Larry Mazlack MAZLACK@ERNIE.BERKELEY.EDU  

jkm@security.UUCP (Jonathan K.Millen) (11/22/85)

---------
     An ideal form of copy protection is possible if each machine has a
serial number that is readable by software (e.g., stored in ROM).  When
a program is sold, it comes in a form that is uncopyable, but as soon as
it runs on a machine, two things happen: (1) it "freezes" on that machine,
that is, it will run only on the machine with that serial number; and (2)
it becomes copyable.
     If the customer gets a new machine, he should be able to send the
original disk back to the vendor (as proof of purchase) and get a new
unfrozen disk for a nominal charge.

hes@ecsvax.UUCP (Henry Schaffer) (11/24/85)

> ---------
>      An ideal form of copy protection is possible if each machine has a
> serial number that is readable by software (e.g., stored in ROM).  When
> a program is sold, it comes in a form that is uncopyable, but as soon as
> it runs on a machine, two things happen: (1) it "freezes" on that machine,
> that is, it will run only on the machine with that serial number; and (2)
> it becomes copyable.
>      If the customer gets a new machine, he should be able to send the

   I have one microcomputer at work, and another at home.  I often carry 
my purchased copy of software with me to work and back.  This is a legal
use which would not be possible with this suggested type of protection.
--henry schaffer

smh@mhuxl.UUCP (henning) (11/25/85)

>      An ideal form of copy protection is possible ..., but as soon as
> it runs on a machine: (1) it will run only on the machine with that 
serial number; and (2) it becomes copyable.
>      If the customer gets a new machine, he should be able to send the
> original disk back to the vendor (as proof of purchase) and get a new
> unfrozen disk for a nominal charge.

****                                                                 ****
From the keys of Steve Henning, AT&T Bell Labs, Reading, PA mhuxl!smh

Please save the word IDEAL for software that I can use on at least 6 different
machines (1 at home and 5 at work) but will only let the licensed user use
and not something like a 'licensed machine' use. I don't mind carrying
around my software, but please don't make me carry around my Mac to places
that already have a Mac available for me to use.  Also, I don't think that
it is acceptable to have to get all new software if your machine gets
trashed or for some reason gets a new ID number.

julian@osu-eddie.UUCP (Julian Gomez) (11/25/85)

>      An ideal form of copy protection is possible if each machine has a
> serial number that is readable by software (e.g., stored in ROM).  When
> a program is sold, it comes in a form that is uncopyable, but as soon as
> it runs on a machine, two things happen: (1) it "freezes" on that machine,
> that is, it will run only on the machine with that serial number; and (2)
> it becomes copyable.
>      If the customer gets a new machine, he should be able to send the
> original disk back to the vendor (as proof of purchase) and get a new
> unfrozen disk for a nominal charge.

What happens if the customer's Mac goes down and he has to get a loaner
for a while? What about a customer who has more than one Mac and buys a
2nd CPU license, which usually means the customer doesn't get another
distribution kit?  (although i have yet to see more than one Mac in the
same room anywhere besides a dealer)
-- 
"If Chaos himself sat umpire, what better could he do?"

	Julian "a tribble took it" Gomez
	Computer Graphics Research Group, The Ohio State University
	{ucbvax,decvax}!cbosg!osu-eddie!julian

vishniac@wanginst.UUCP (Ephraim Vishniac) (11/25/85)

>    I have one microcomputer at work, and another at home.  I often carry 
> my purchased copy of software with me to work and back.  This is a legal
> use which would not be possible with this suggested type of protection.
> --henry schaffer

Alas, it's not legal according to Microsoft.  I recently received my update
for MS Basic, so parts of the long and baffling licensing agreement are
fresh in my mind.  They seem to insist that when you purchase their software,
you purchase it for use on one *machine*, not for use by one *person*.

-- 
Ephraim Vishniac
  [apollo, bbncca, cadmus, decvax, harvard, linus, masscomp]!wanginst!vishniac
  vishniac%Wang-Inst@Csnet-Relay

jkm@security.UUCP (Jonathan K.Millen) (11/26/85)

In article <799@ecsvax.UUCP> hes@ecsvax.UUCP (Henry Schaffer) writes:
>> ---------
>>      An ideal form of copy protection is possible if each machine has a
>> serial number that is readable by software (e.g., stored in ROM).  When
>> a program is sold, it comes in a form that is uncopyable, but as soon as
>> it runs on a machine, two things happen: (1) it "freezes" on that machine,
>> that is, it will run only on the machine with that serial number; and (2)
>> it becomes copyable.
>>      If the customer gets a new machine, he should be able to send the
>
>   I have one microcomputer at work, and another at home.  I often carry 
>my purchased copy of software with me to work and back.  This is a legal
>use which would not be possible with this suggested type of protection.
>--henry schaffer

     The "second machine" case is very much like the "new machine" case.  You
should be able to send the original disk to the vendor and receive an
unfrozen copy (while still keeping a copy of the frozen one). The new disk
would not be free, since the vendor has handling, copying, mailing, and
disk costs to cover, and may also want to charge something extra to
discourage people from redistributing them.  The new-disk charge would still
be no more than wholesale price (I assume about half retail), and it could
be much less on expensive programs - just enough to cover customer
registration bookkeeping.  Keep in mind that customer registration would
not be necessary for every customer, only those who request a new disk, and
not until they do so.

Jon Millen

"We should stand on the shoulders of those who have gone before us...
not on each other's toes." -a Peter Neumann paraphrase

jkm@security.UUCP (Jonathan K.Millen) (11/27/85)

In article <345@mhuxl.UUCP> smh@mhuxl.UUCP (henning) writes:
>>      An ideal form of copy protection is possible ..., but as soon as
>> it runs on a machine: (1) it will run only on the machine with that 
>serial number; and (2) it becomes copyable.
>>      If the customer gets a new machine, he should be able to send the
>> original disk back to the vendor (as proof of purchase) and get a new
>> unfrozen disk for a nominal charge.
>
>****                                                                 ****
>From the keys of Steve Henning, AT&T Bell Labs, Reading, PA mhuxl!smh
>
>Please save the word IDEAL for software that I can use on at least 6 different
>machines (1 at home and 5 at work) but will only let the licensed user use
>and not something like a 'licensed machine' use. ...

Sounds like you want a site license for free here.

> ....  Also, I don't think that
>it is acceptable to have to get all new software if your machine gets
>trashed or for some reason gets a new ID number.

I can sympathize with this objection; my Mac has already had a logic board
replacement.  How about this: when you buy the package, it already has
two unfrozen disks in it.  Save one for a disaster or use it on a second
machine (you can still get more, for a price).

Jon Millen

"We should stand on the shoulders of those who have gone before,
not on one another's toes." -a Peter Neumann paraphrase

bantz@Clio.Uiuc.ARPA (11/27/85)

Using the same purchased software on two machines (home and work) 
sure seems like a reasonable use, but it proscribed by the 
"shrink-wrap" "agreement" on some software, which clearly
"licenses" the software for use on a particular cpu.

gig@ritcv.UUCP (Gordon Goodman) (11/28/85)

As was mentioned in another posting, using a rom serial number to imprint on
software makes it impossible to use software legitimately.  The DEC Pro 350
used this scheme much to my dismay.  In university lab settings, this
protection scheme is a horror.  How can students buy software when it can only
be used on one particular machine?  

Gordon Goodman
RIT

jkm@security.UUCP (Jonathan K.Millen) (11/29/85)

In article <885@osu-eddie.UUCP> julian@osu-eddie.UUCP (Julian Gomez) writes:
>>      An ideal form of copy protection is possible if ...
>
>What happens if the customer's Mac goes down and he has to get a loaner
>for a while? ....

A dealer could provide a loaner with frozen copies of all the software
you need, and then some.  It would be a great incentive to get your machine
fixed there - test drive any software you like, while you're waiting for
your machine to be repaired!

Jon Millen

"We should stand on the shoulders of those who have gone before us,
not on each other's toes." -a Peter Neumann paraphrase

smh@mhuxl.UUCP (henning) (12/02/85)

> >What happens if the customer's Mac goes down and he has to get a loaner
> >for a while? ....
> 
> A dealer could provide a loaner with frozen copies of all the software

That is illegal.  You can not give people copies of licensed software unless
you pay for a very liberal license.  The user is licensed and not the machine.
I can see it now on the NY Times:  "Lotus sues machine for violating license
agreement."  We could create machines that would only run one program.  That
would really solve the problem.  The software would be in rom. [:{)>

jkm@security.UUCP (Jonathan K.Millen) (12/02/85)

-------
     From the various objections I've seen to copy protection based on
freezing copyable software on a ROM serial number, it appears that the
REALLY ideal scheme should identify the purchaser rather than the
machine.  The software should freeze on the buyer's fingerprint, or
some other personal characteristic which (unlike a password) can't be
given away.  I wish I could think of a way to do that.

Jon Millen

"We should stand on the shoulders of those who have gone before us,
not on one another's toes." -a Peter Neumann paraphrase

jimb@amdcad.UUCP (Jim Budler) (12/03/85)

In article <348@mhuxl.UUCP> smh@mhuxl.UUCP (henning) writes:
>> >What happens if the customer's Mac goes down and he has to get a loaner
>> >for a while? ....
>> 
>> A dealer could provide a loaner with frozen copies of all the software
>
>That is illegal.  You can not give people copies of licensed software unless
>you pay for a very liberal license.  The user is licensed and not the machine.
>I can see it now on the NY Times:  "Lotus sues machine for violating license
>agreement."  We could create machines that would only run one program.  That
>would really solve the problem.  The software would be in rom. [:{)>

Doesn't that answer the question?  If they are issuing a license to ME,
not to my MACHINE, what are they doing putting any machine dependencies in
it.

I think it is time some one made the software vendors make up their minds:

	1) Are they selling a product?
	2) Are they licensing a trade secret?
	3) Are they distributing a copyrighted article?

Right now they are trying to get the best of all three worlds.  i.e.

	1) The vendors don't sell anything, but license it, thus avoiding
	all product liability laws.

	2) They license use of their software.  In the mainframe world this
	procedure also includes maintanence and support, but not in the
	micro world.

	3) They copyright it in addition, just to gain some extra protection
	for their overblown prices, then say it isn't the same as a book
	and shouldn't allow lending libraries.

I think anything I buy in a retail store with money is a product and should
be subject to the product liability and warranty laws.  And this means that
when some 'copy protection scheme' causes me to lose legitimate use of
something that I have paid for, the vendor is fully liable under the law.
-- 
 Jim Budler
 Advanced Micro Devices, Inc.
 (408) 749-5806
 Usenet: {ucbvax,decwrl,ihnp4,allegra,intelca}!amdcad!jimb
 Compuserve:	72415,1200

Bogus newsgroup: net.news: Move to end of .newsrc[yn^L]?

Don't be dictators, use thought.

hes@ecsvax.UUCP (Henry Schaffer) (12/03/85)

>      From the various objections I've seen to copy protection based on
> freezing copyable software on a ROM serial number, it appears that the
> REALLY ideal scheme should identify the purchaser rather than the
> machine.  The software should freeze on the buyer's fingerprint, or
> some other personal characteristic which (unlike a password) can't be
> given away.  I wish I could think of a way to do that.
> Jon Millen

   BOTH options should be available to the purchaser.  The software should
be able to sit on one machine and let anyone come along and use it.  It
should also be able to be moved to another machine.  So I think that all
this talk about "freezing" misses the point.  The protection needed, to
allow normal and effective use of the software, and yet to
assure compliance with copyright law, is some method to prevent (multiple)
concurrent use by >1 person  OR by >1 machine.
--henry schaffer

bill@utastro.UUCP (William H. Jefferys) (12/03/85)

> Using the same purchased software on two machines (home and work) 
> sure seems like a reasonable use, but it proscribed by the 
> "shrink-wrap" "agreement" on some software, which clearly
> "licenses" the software for use on a particular cpu.

Not necessarily.  Reading from the standard Microsoft License
Agreement, Article 1 specifies use on a single COMPTUTER at a
single location, but Article 4 reads:

"As the LICENSEE, you may physically transfer the SOFTWARE from one
computer to another provided that the SOFTWARE is used on only one
computer at a time..." (The rest of Article 4 is not relevant to
this discussion).  It seems to me that this article specifically
permits the kind of use that was contemplated, at least in the case
of Microsoft.

dick@ucsfcca.UUCP (Dick Karpinski) (12/04/85)

In article <1009@security.UUCP> jkm@security.UUCP (Jonathan K.Millen) writes:
>REALLY ideal scheme should identify the purchaser rather than the
>machine.  The software should freeze on the buyer's fingerprint, or
>some other personal characteristic which (unlike a password) can't be
>given away.  I wish I could think of a way to do that.
>
That is the point of the $5-15 dongle, a piece of hardware attached
to the computer in some innocuous way (as a pass thru rs232 port?)
which acts as a singular, non-reproduceable key.  If it is a micro
chip with one subroutine in its rom, then it will be hard to cheat.
But you can move it to the office/home/replacement computer easily.

Dick

-- 
Dick Karpinski    Manager of Unix Services, UCSF Computer Center
UUCP: ...!ucbvax!ucsfcgl!cca.ucsf!dick   (415) 666-4529 (12-7)
BITNET: dick@ucsfcca   Compuserve: 70215,1277  Telemail: RKarpinski
USPS: U-76 UCSF, San Francisco, CA 94143

berry@tolerant.UUCP (David Berry) (12/05/85)

>    BOTH options should be available to the purchaser.  The software should
> be able to sit on one machine and let anyone come along and use it.  It
> should also be able to be moved to another machine.  So I think that all
> this talk about "freezing" misses the point.  The protection needed, to
> allow normal and effective use of the software, and yet to
> assure compliance with copyright law, is some method to prevent (multiple)
> concurrent use by >1 person  OR by >1 machine.
> --henry schaffer

I got it!  Put little radio transmitters in every disk that continuously
broadcast what program is being run from them :-).
-- 

	David W. Berry
	{ucbvax,pyramid,idsvax,bene,oliveb}!tolerant!berry

	[Don't shoot the Tolerant Systems, I'm just the consultant]

briand@tekig4.UUCP (Brian Diehm) (12/06/85)

>     From the various objections I've seen to copy protection based on
>freezing copyable software on a ROM serial number, it appears that the
>REALLY ideal scheme should identify the purchaser rather than the
>machine.  The software should freeze on the buyer's fingerprint, or
>some other personal characteristic which (unlike a password) can't be
>given away.  I wish I could think of a way to do that.

I'm FAR from being a midwest Bible-thumper, but that book DOES indeed refer
(apocryphally) to such a scheme - all we need do is put an identifying mark
on every person.  Revelations mentions forehead or wrist.  What with the
banks being antsy about volumnious losses over credit card scams, and what
with suggestions like the above, it seems pretty inevitable.

Personally, this scares the s*it out of me.  I prefer a world where at least
some crime is still possible - civil disobedience may be our only form of
protest someday!

-Brian Diehm
Tektronix, Inc. (Solely my opinions, folks!)

eilers@stolaf.UUCP (David V. Eilers) (12/06/85)

> -------
>      From the various objections I've seen to copy protection based on
> freezing copyable software on a ROM serial number, it appears that the
> REALLY ideal scheme should identify the purchaser rather than the
> machine.  The software should freeze on the buyer's fingerprint, or
> some other personal characteristic which (unlike a password) can't be
> given away.  I wish I could think of a way to do that.
> 
> Jon Millen
> 
> "We should stand on the shoulders of those who have gone before us,
> not on one another's toes." -a Peter Neumann paraphrase


Interesting.  Sense we are simply dreaming up a system, a card could be
given to every purchaser of a mac.  Simply plug that card (ROM?) into
the mac you are useing and you are then able to use any software
that has been frozen with your number on.  What do you think?
Sure, there would be ways around this.  Like copying the card or
inventing a machine to emulate any card, but this would make it
very unconvenient to use a copy frozen with another ROM number.
You would either have to keep alot of extra cards around or keep track
of a lot of numbers.  (Not to mention having to know the number in
the first place.)  Also, if this system were made relatively
expensive as far as reproducing a ROM card goes (~$30.00) it would make
it more economically feasible to buy inexpensive software, than to make illegal
copies.  On the other side, it would make inexpensive software more
feasible because, most copies would be brought, not stolen, and the returns
on marketing an inepensive program would go up.  It would also presure
vendors to keep there prices within the range of a copied card because, if the
price was considerably higher, people might be willing to go through the
trouble of an extra card for the *large* difference in price.

Dave Eilers
ihnp4!stolaf!eilers

reid@dciem.UUCP (Reid Ellis) (12/08/85)

In article <1009@security.UUCP> jkm@security.UUCP (Jonathan K.Millen) writes:
>the REALLY ideal scheme should identify the purchaser rather than the
>machine.  The software should freeze on the buyer's fingerprint, or
>some other personal characteristic which (unlike a password) can't be
>given away.  I wish I could think of a way to do that.

How about the way the person types?  I believe that there is an area of
identification in which the rhythm of the user typing in his password is
as important as the password he types.  Of course, the amount of code
required to do this would probably be prohibitive, but this is an *ideal*
solution after all..
  Some thoughts on implementation:
When run the first time, the program gives you a dialog box in which you
type your password.  If you botch the password (or actually plain text,
listed in the dialog if you like) it clears and waits for another try.
There is a standard "Cancel" button to return to the finder.
  The information is recorded in a file and if that file is found missing,
the program returns to the finder.  Thereafter, the user needs to type in
a password or short phrase and there you go.
  A problem would be that typing the password would be tedious if done
too often, if the program is used many times per day.  As well, of course,
you could copy the program first, and *then* run it, so maybe this isn't the
*ideal* scheme after all.
-- 
--
Reid Ellis	"Roads?  Where we're going, who needs _roads_?"
{{allegra,decvax,duke,floyd,linus}!utzoo,{ihnp4,utzoo}!utcsri}!dciem!reid
This message brought to you courtesy of the Poslfit Committee

keithd@cadovax.UUCP (Keith Doyle) (12/10/85)

In article <223@tolerant.UUCP> berry@tolerant.UUCP (David Berry) writes:
>
>I got it!  Put little radio transmitters in every disk that continuously
>broadcast what program is being run from them :-).
>-- 
>
>	David W. Berry

Don't laugh!  There was a rumor in net.video or similar place
a couple of months ago about certain unscrupulous agencies (FCC, FBI,
or maybe Nielsen?) driving panel trucks around with sensitive instrumentation
designed to pick up signals from the I.F. amps in your T.V. tuners, in order
to determine what channels people are watching (they'd all get channel 3
(L.A.) if you ask me).  Maybe this technique could be adapted to look for
the electronic 'fingerprint' of what program is running in your computer.
Might be a way to determine if an inordinate amount of illegal copies of
Lotus or something are running in a building somewhere.  (ADAPSO are you
listening?)

Keith Doyle
#  {ucbvax,ihnp4,decvax}!trwrb!cadovax!keithd
#  cadovax!keithd@ucla-locus.arpa

Reminds me of the old days when the first program that I got running on my
first personal computer (IMSAI) before I had any peripherals, was a
program to play 'Daisy' thru an A.M. radio, that was keyed in through the
front panel switches.

dick@ucsfcca.UUCP (Dick Karpinski) (12/12/85)

In article <5018@stolaf.UUCP> eilers@stolaf.UUCP (David V. Eilers) writes:
>> freezing copyable software on a ROM serial number, it appears that the
>> REALLY ideal scheme should identify the purchaser rather than the
>> machine.  The software should freeze on the buyer's fingerprint, or
>
>Interesting.  Sense we are simply dreaming up a system, a card could be
>given to every purchaser of a mac.  Simply plug that card (ROM?) into
>Dave Eilers

It is called a "dongle" and really effective ones incorporate a bit of
the application on the card.  This makes it very difficult to do 
without the dongle.  In volume they can be produced for about $20.
One way to employ them is by attaching to a modem port.  A cheap
micro chip with its subroutine in its ROM is enough.  Very effective.

Dick

-- 
Dick Karpinski    Manager of Unix Services, UCSF Computer Center
UUCP: ...!ucbvax!ucsfcgl!cca.ucsf!dick   (415) 666-4529 (12-7)
BITNET: dick@ucsfcca   Compuserve: 70215,1277  Telemail: RKarpinski
USPS: U-76 UCSF, San Francisco, CA 94143

david@sagan.UUCP (David Taylor) (12/13/85)

1002@security.UUCP> <799@ecsvax.UUCP> <9081@ritcv.UUCP> <1009@security.UUCP> <
837@ecsvax.UUCP> <223@tolerant.UUCP> <978@cadovax.UUCP>
Sender: 
Reply-To: david@sagan.UUCP (David Taylor)
Followup-To: 
Distribution: net
Organization: MicroPro Int'l Corp., San Rafael, CA
Keywords: 

The person who describes the rumor about the FCC checking your home tv
emissions to determine what channel you are watching is obviously unaware
of the situation in England, where this exact method is used to catch
people, who are behind on their TV licence payments.
         Yes, thats right, it is necessary to pay the UK government a fee
to be allowed to watch TV in the UK. The funds are supposed to help support 
the BBC. (Perhaps the PBS stations should try it here . . . )
-- 
david
... David W.Taylor, MicroPro Product Development
{dual,hplabs,glacier,lll-crg}!well!micropro!sagan!david

kim@mips.UUCP (Kim DeVaughn) (12/13/85)

> It is called a "dongle" and really effective ones incorporate a bit of
> the application on the card.  This makes it very difficult to do 
> without the dongle.  In volume they can be produced for about $20.
> One way to employ them is by attaching to a modem port.  A cheap
> micro chip with its subroutine in its ROM is enough.  Very effective.
							^^^^^^^^^^^^^^
NOT if you have a good debugger, logic analyzer, and some a reasonable
amount of intelligence (say, a 5th grade education).  They can be broken
*quite* easily, and afford little "protection" against shoplifters.

The reason I chose to use the word "shoplifters" is to remind the soft-
ware industry (and in particular, the ADAPSO crowd) that they aren't any
different than any other type of vendor.  ACCEPT THE FACTS OF LIFE PEOPLE,
YOU *WILL* GET RIPPED-OFF NOW AND THEN.  Why not try taking the mature,
rational, sensible approach that Borland has pioneered.  NO COPY/EXECUTION
PROTECTION ... just an excellent product, a *reasonable* price, quality
documentation (in a form that's difficult to copy), good support, and a
site licensing policy (Borland is a bit *too* high on this, in my opinion).

You think they haven't profitted?  Go look at their offices in Scotts
Valley ...

/kim


Disclaimer:  I believe that the above opinions represent a majority of the
             marketplace today (other than the ADAPSO crowd).  I could be
	     wrong, but I doubt it.  In any case, these opinions, while not
	     copy-protected, are also not Guaranteed to do *anything* for 
	     any purpose whatsoever.  My employer may or may not agree with
	     my opinions.
	     
	     BTW, there is a good discussion on the copy-protection of human
	     genes going on somewhere on the net ...
-- 

UUCP:  {decvax,ucbvax,ihnp4}!decwrl!mips!kim
DDD:   415-960-1200
USPS:  MIPS Computer Systems Inc,  1330 Charleston Rd,  Mt View, CA 94043

rp321@uiucuxa.CSO.UIUC.EDU (12/13/85)

/* Written  6:32 pm  Dec  7, 1985 by reid@dciem.UUCP in uiucuxa:net.micro.mac */
In article <1009@security.UUCP> jkm@security.UUCP (Jonathan K.Millen) writes:

How about the way the person types?  I believe that there is an area of
identification in which the rhythm of the user typing in his password is
as important as the password he types.  Of course, the amount of code
required to do this would probably be prohibitive, but this is an *ideal*
solution after all..
[...]
-- 
--
Reid Ellis	"Roads?  Where we're going, who needs _roads_?"
{{allegra,decvax,duke,floyd,linus}!utzoo,{ihnp4,utzoo}!utcsri}!dciem!reid
This message brought to you courtesy of the Poslfit Committee
/* End of text from uiucuxa:net.micro.mac */

Another problem with the scheme... what if the user happens to be a bit tipsy,
not quite awake, etc., and can't quite get the rhythm right.  What about
careless typos?  Basing the protection on how the user types just isn't a good
idea.

			Russell J. Price
			University of Illinois
			{ ihnp4, pur-ee, convex }!uiucdcs!uiucuxa!rp321
			rp321@uiucuxa.CSO.UIUC.EDU
Disclaimer: the above address will not be valid pretty soon... the semester's
ending....

rp321@uiucuxa.CSO.UIUC.EDU (12/13/85)

/* Written  7:36 pm  Dec  9, 1985 by keithd@cadovax.UUCP in uiucuxa:net.micro.mac */
In article <223@tolerant.UUCP> berry@tolerant.UUCP (David Berry) writes:

Don't laugh!  There was a rumor in net.video or similar place
a couple of months ago about certain unscrupulous agencies (FCC, FBI,
or maybe Nielsen?) driving panel trucks around with sensitive instrumentation
designed to pick up signals from the I.F. amps in your T.V. tuners, in order
to determine what channels people are watching (they'd all get channel 3
(L.A.) if you ask me).  Maybe this technique could be adapted to look for
the electronic 'fingerprint' of what program is running in your computer.
Might be a way to determine if an inordinate amount of illegal copies of
Lotus or something are running in a building somewhere.  (ADAPSO are you
listening?)

/* End of text from uiucuxa:net.micro.mac */

Can you say "Big Brother is listening?"  The invasion of privacy potential
is staggering!

			Russell J. Price
			University of Illinois
			{ ihnp4, pur-ee, convex }!uiucdcs!uiucuxa!rp321
			rp321@uiucuxa.CSO.UIUC.EDU
Disclaimer: the above address will not be valid pretty soon... the semester's
ending....

pugh@cornell.UUCP (William Pugh) (12/17/85)

	I saw an interesting copy protection method on a game for the
C-64 (the game is Elite).. The system is called LensLok.  The game comes with
a little plastic lens contraption.  When the program starts up, it displays
some stuff that looks like garbage on the screen.  When you place the
lens gadget against the screen and look through it, you can clearly see a
two letter code. To run the program, you simply have to key in those two
letters.  The two letters are generated randomly each time the program is
run.
	Its a little bothersome, sort of like using a key-disk, but it's okay
for games.


-- 
Bill Pugh
Cornell University
..{uw-beaver|vax135}!cornell!pugh
607-257-6994