kurt@tc.fluke.COM (Kurt Guntheroth) (06/27/90)
Any program using ID proms can be broken by deleting all the calls to the checker. If the program is encrypted on the disk, it can be decrypted once and stored in decrypted form. All you need is a good logic analyzer. Also, customizing the software makes building the disks harder since each disk must be different. The question is, how many pirates have access to the tools? In the PC world they have boards that plug into the PC to assist with this (and legitimate work too). Do the PC folks have experience that leads to the belief that no encryption method is safe?