TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The cleverest floppy disc protection ever? Western Security Ltd

339 pointsby scarybeastover 4 years ago

30 comments

IIAOPSWover 4 years ago
Way back when monetized flash games were a thing, there was a problem of ad piracy (people who would decompile your game and then upload and monetize it as their own). The conventional wisdom at the time was that piracy could only be delayed, not prevented. The reasoning was that a piracy check has to read the sites URL at some point and the hacker can just search for the only command in all of actionscript which does that.<p>My game contained a very standard check url type protection. This was not the real protection. This was the piece of code which the hacker was supposed to notice and remove. Early on in the game there was a function call to get the total number of bytes in the file and then divide it by the number of expected bytes. Ostensibly this was to calculate the size of the loading bar. I stored this information in a forgettable global variable. On the surface this looks like the sloppy coding one expects from flash devs. But the real purpose was so that I could later check if this number was not 1.0 and trigger the true copy protection. Long story short if the number of bytes were incorrect then the game becomes unplayable after a few levels. I thought that was a nice touch since these hackers usually didn&#x27;t play though enough of the game to test if their hack worked.
评论 #25432664 未加载
acomjeanover 4 years ago
Its all very clever. Till it doesn&#x27;t work. A long time ago, we got EA&#x27;s &quot;seven cities of gold&quot; from my parents for apple.<p>My brothers and I were all excited but it would start to load then the drive would make a strange sound and it didn&#x27;t work. We exchanged at the local software store, the next one did the same thing.. We tried on a friends apple &#x2F;&#x2F;c and it worked there. Our &#x2F;&#x2F;e drives must have been slightly out of spec. It was bitter disappointment. But a valuable lesson.<p>They&#x27;re now imaging floppies into new formats so the copy protected disk can still run in emulation:<p>Things like the &quot;Woz&quot; format <a href="https:&#x2F;&#x2F;applesaucefdc.com&#x2F;woz&#x2F;reference1&#x2F;" rel="nofollow">https:&#x2F;&#x2F;applesaucefdc.com&#x2F;woz&#x2F;reference1&#x2F;</a>
评论 #25429635 未加载
评论 #25430834 未加载
jedbergover 4 years ago
My favorite copy protection was on some games I had (I want to say they were Microprose games? But I could be wrong) where they would cut the hole in the disk just slightly bigger, and then take advantage of the fact that in DOS you could talk directly to the hardware to convince the read head to go just a little too far. Then it could read the magic 41st track to load the game, but no disk copy program could copy it.
评论 #25424076 未加载
评论 #25423085 未加载
评论 #25423586 未加载
carapaceover 4 years ago
Who recalls the provenance of this old legend about the fellow who challenged his pal to decode a certain floppy?<p>It was a bog-standard DOS boot disk (IIRC) that he could put in his machine and boot normally. But his pal put it in his computer and... nothing doing, no boot. Analysis of the floppy availed not. The challenge went unmet.<p>What did our hero do to make the floppy?<p>.esrever ni nups evird eht os ytiralop etisoppo htiw meht dehcattaer dna ,rotom eldnips evird eht ot seriw rewop eht deredlosed ,evird ksid eht denepo eH
评论 #25423268 未加载
评论 #25422502 未加载
评论 #25422964 未加载
评论 #25423516 未加载
评论 #25423019 未加载
评论 #25426583 未加载
评论 #25422880 未加载
评论 #25422814 未加载
评论 #25422432 未加载
评论 #25426370 未加载
berkutover 4 years ago
Slightly off-topic, but since when were floppies referred to as &quot;disc&quot;, as opposed to &quot;disk&quot;? I thought it was from Diskette?<p>Is it a language &#x2F; region thing?<p>Optical discs <i></i>were<i></i> &quot;disc&quot;, but at least growing up in the UK in the 80s&#x2F;90s with DOS&#x2F;Windows, I&#x27;m pretty certain I remember them always being &quot;disk&quot; for floppies?<p>Am I misremembering?
评论 #25424849 未加载
评论 #25423317 未加载
评论 #25423708 未加载
评论 #25423154 未加载
评论 #25423234 未加载
评论 #25423687 未加载
评论 #25422978 未加载
评论 #25428338 未加载
评论 #25423328 未加载
marcan_42over 4 years ago
Modern copy protection techniques are often based on this same principle. For example, the GameCube and Wii do a very similar thing. Since they use optical media, that doesn&#x27;t have tracks but instead a single spiral groove, what they do is use a laser to burn little scratches into the disc (which you can see against a light). After mastering and lasering, the disc is checked to see what sectors the marks damaged. Error correction ensures the data is undamaged, but the drive can find these drop-outs. Then a table containing the sector locations is encoded and burned with the same laser into the &quot;burst cut area&quot;, effectively a standard barcode format in the inner ring of the disc (this part is standard, many normal drives can read BCAs).<p>This all works because the specific angular position of any given sector is unpredictable during optical disc mastering. The groove is continuous, and never lines up in exactly the same way. So, just like the floppy trick, this is &quot;fingerprinting&quot; the natural variation in write speeds of different disc mastering&#x2F;burning systems. This scheme is undefeatable using off the shelf burners, but one trick that Datel used to master compatible unofficial discs is to rip the encrypted BCA table off of a real game (so they didn&#x27;t have to crack the encryption, though that was possible later since it&#x27;s symnetric) and, instead of burning marks into the disc, just <i>turning off the mastering laser</i> writing the disc track at the exact same points in each track. Those discs don&#x27;t have any holes, but they have a pattern of sector damage that is indistinguishable to the drive (even though the angular positions no longer match), and they work. I believe the same trick should work with a lightly modified standard burner, if you can manage to find a way to burn the BCA (and you need other firmware patches for some other data-level changes to the disc, but those are easier).<p>Xbox (360 and One discs at least I believe) also do this IIRC, but instead of intentional damage the drive has the ability to compute angular relationships between sectors I believe, though I&#x27;m not familiar with the details of that scheme.
m463over 4 years ago
Back in the 1980&#x27;s I think there were a lot of interesting schemes.<p>The solution was to just get an updated version of copy2pc or copywrite and they would have a fix.<p>But I remember a few schemes that were interesting workarounds.<p>One was the hole in the disk, one was a laser-burned dot on the disk.<p>I recall with the hole in the disk - the software would try to read and if it succeeded it was a copy.<p>The second one was <i>slightly</i> different and I believe the software would write to it, and read it back, and if it could read it back it was a copy.<p>However the best of all was either the scratch-n-sniff card from Leather Godesses of Phobos, or the Age Verification of Leisure Suit Larry.<p>example:<p><pre><code> &quot;Gone With The Wind&quot; is about a. outer space. b. a bank robbery. c. four hours long. d. dust. </code></pre> or<p><pre><code> President Ford prescribed _____ for dealing with economic problems. a. tranquilizers b. employment c. that everyone wear a WIN button d. that everyone should have a nice day</code></pre>
评论 #25424364 未加载
评论 #25426537 未加载
评论 #25426619 未加载
h2odragonover 4 years ago
I never did BBC Micro, but in the early PC days there were &quot;Copy II PC&quot; add in ISA cards that the floppy cable passed through on the way to the drive. With their software most any floppy disk could be copied with a standard PC drive; and with a bit of hacking you could do things like read Victor 9000 floppies.<p>There was only one floppy I could never get, a licensed Scrabble game that insisted on writing scores to its game disc. My mom loved that game and we had to buy it twice. It was humiliating, I had this special hardware and I never did figure that one out.<p>* found one: <a href="https:&#x2F;&#x2F;www.biocomp.net&#x2F;o62799.htm" rel="nofollow">https:&#x2F;&#x2F;www.biocomp.net&#x2F;o62799.htm</a>
评论 #25422356 未加载
VikingCoderover 4 years ago
I remember my tech-savvy uncle was used to PCs which could read double-sided floppy disks. His jaw about dropped out of his skull when he saw me do the 0.5 second floppy-disk-flip that Apple IIc gamers got used to doing, because they could only read from a single side of the disk.
notacowardover 4 years ago
I remember a similar &quot;easy to write, easy to read, hard to recreate&quot; approach being touted for credit-card security a while ago. The idea was to embed bits of glitter in a clear epoxy matrix, and collect a &quot;fingerprint&quot; of the result when read from different angles. It would be nearly impossible to recreate the glitter pattern. I really liked the idea, but apparently they never solved the alignment problem well enough to make the &quot;easy to read&quot; part a reality.
beagle3over 4 years ago
IIRC, Quaid software&#x27;s Copywrite on the PC was able to reliably duplicate weak bits, and had a companion called &quot;zerodisk&quot; which would -- in cooperation with marks left by Copywrite -- emulate laser holes.<p>I remember at least one copy protection system I analyzed, which get &quot;free reign&quot; into writing tracks, by configuring the drive to write just one huge sector per track (which ended up being longer than the track), end encoding the sector gaps &quot;in band&quot; which later became &quot;out of band&quot; because the main track header was overwritten (and an &quot;in band&quot; one became out-of-band).<p>It was interesting, but I have no nostalgia for that.
parsimo2010over 4 years ago
Some thoughts:<p>1. I love how half the comments here are about disc&#x2F;disk, which was just a passing comment in the article.<p>2. I really like reading these sorts of stories where modern hackers figure out the tricks used in vintage technology. They&#x27;re interesting, and makes me feel a little better that all the clever hackers haven&#x27;t died off yet. Sometimes I feel like the power of modern computers has made people lazy and we&#x27;re going to lose our ability for clever solutions. But maybe the clever people are still there.<p>3. If you like reading about copy protection and (I can&#x27;t believe I&#x27;m about to call the PS1 vintage) vintage tech, you might like this story about the copy protection for Spyro on the PS1. It wasn&#x27;t so much copy protection as it was punishment after the copying. <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=4GYSeXLr5sY" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=4GYSeXLr5sY</a>
mattbeeover 4 years ago
The other thing this scheme gives you is a unique image per customer, so you could use it to trace illegal copies.<p>When I worked on some expensive emulator software 22 years ago, floppy protection wasn&#x27;t appropriate but I suggested to the boss that we use the order of linker symbols in the main executable to encode the customer&#x27;s serial number.<p>I guess it was a No because they wanted to use a standard duplicator, but also piracy was pretty well deterred by the 486 daughter board you needed to run it :)
14over 4 years ago
This reminded me of back in the day with Xbox 360 and the cat and mouse we played with MS. MS started making their games I believe 4.8gb in size and all the pirates could only buy DVDs which were smaller as nothing bigger was actually available. The first thing pirates did was truncate the games and removed some padding so they could fit all the security features the disc required to play and remain stealth. Then MS found a way to detect truncated discs and many people were banned. Then one of the 360 main hackers came out with a genius idea to take the discs we could buy and modify the firmware to a certain brand and model of DVD burner to allow the burner to burn right to the outer edge of the DVD. This was possible because all dvds are actually slightly larger then their listed size but standard DVD burners could not burn to the extreme edge. Some burns didn’t write perfect and sometimes you had to burn it a few times before it was stealth. They also had a program to see if the stealth worked and the disc passed or failed. I never did receive a ban and eventually moved to another mod on my 360 that didn’t require discs at all. What a flashback reading this article.
itronitronover 4 years ago
I don&#x27;t recall how my friends and I figured this out, if we discovered it or just heard about it, but it became standard practice to carefully insert a finger into the disc drive and slow the spinning disc when loading up a copied disc in order to defeat any complaints from the OS. Not sure why this worked but it always did :)
评论 #25428726 未加载
tomc1985over 4 years ago
Is &quot;disc&quot; British English?<p>I have always understood &quot;disk&quot; to mean a floppy disk or hard disk (as short for diskette), and &quot;disc&quot; to refer to circular discs like CDs. (Yes, disks have discs inside them but they are squareish to hold)<p>Seeing people refer to floppy disks as discs really bugs me for some reason.
评论 #25425088 未加载
评论 #25428978 未加载
Springcleaningover 4 years ago
We had to build our own copy protection after dongles were hacked and too fussy. Weak bits were copyable using the CopyIIPC option board.<p>So what we resorted to is using a needle scratching the inner most tracks of the floppy on random locations. Writing those tracks with a pattern and record where the pattern was broken. While executing the program it did write that track and read that track, the locations where the pattern was broken (two tracks, begin and end) was the key that was used to decrypt some parts of the further into the program.<p>To my knowledge it was never hacked and every disk was unique, we kept the keys for each customer (was part of the serial) so if it was hacked we could trace it to the leaker.
m3kw9over 4 years ago
DVD or CD protections had this type of protection where they read a part of the disk most DVD writers can’t write to
评论 #25423351 未加载
djmipsover 4 years ago
Not the Beeb but this copy protection was common even quite early on the Apple II. We we ran our disk drives with the cases off so we could adjust the speed screw to match track lengths. We had software that would visually feedback the track length so you could get it spot on.
empressplayover 4 years ago
See also Spiradisc <a href="https:&#x2F;&#x2F;paleotronic.com&#x2F;2018&#x2F;10&#x2F;27&#x2F;microm8-update-apple-ii-emulation-and-spiradisc-support&#x2F;" rel="nofollow">https:&#x2F;&#x2F;paleotronic.com&#x2F;2018&#x2F;10&#x2F;27&#x2F;microm8-update-apple-ii-e...</a>
ballenfover 4 years ago
I don&#x27;t think it was mentioned, but I wonder if the mains power fluctuation (voltage or hz) would affect drive sector length &#x2F; rpm also? So even the same drive couldn&#x27;t produce a high fidelity copy of one of these discs if the power input was different.
评论 #25422866 未加载
评论 #25422911 未加载
ameliusover 4 years ago
I&#x27;m curious what tricks people use nowadays for software copy protection? Are dongles still a thing? Have people given up on the idea of software protection? (SaaS is probably the best kind of protection if you don&#x27;t take it too literally)
评论 #25426527 未加载
评论 #25426505 未加载
评论 #25426603 未加载
billpgover 4 years ago
My recollection from the day was that &quot;disk&quot; was a class of file storage that allowed random access, distinct from tape which needs to be positioned.<p>(For example, &quot;RAM DISK&quot; which isn&#x27;t at all cylindrical.)
enriqutoover 4 years ago
I&#x27;m just halfway of the text and I&#x27;m already tippy-tapping like an excited toddler waiting for candy! This has the same hackish aura as the &quot;story of Mel&quot;
blainesover 4 years ago
The comments are rather interesting as apparently George Keeling himself commented and confirmed everything. :)
lowbloodsugarover 4 years ago
Never forget the press release &quot;This is the first game that cannot be copied&quot;.<p>And that&#x27;s how I learned 6502.
DrBazzaover 4 years ago
I seem to remember the only software that would copy any disk you pointed it at, was in fact the source code listed in the official Acorn DFS manual. With the drawback that it copied one sector at a time, so without a double drive, that was a lot of swapping for a 40 track disk, let alone an 80 track one.
garmaineover 4 years ago
Wouldn’t this be trivial to defeat once you know how it works though? Make a bit-for-bit copy, then overwrite track 9 with the new obfuscated lengths.
评论 #25423782 未加载
评论 #25423802 未加载
评论 #25428744 未加载
评论 #25426306 未加载
RcouF1uZ4gsCover 4 years ago
Fully online, streaming gaming a la Stadia, will be the ultimate in copy and cheat protection. Since you don&#x27;t have access the the actual code, you won&#x27;t be able to modify or hack it to either cheat or bypass protection.
评论 #25422131 未加载
评论 #25423220 未加载
cslover 4 years ago
Very clever and great article! But it sounds pretty easy to write a cracker for it: Just rewrite the machine code to jump over the check. Or did I miss anything?<p>Edit: Guess it depends on the details and amount of &quot;obfuscation&quot; that he mentions.
评论 #25423410 未加载
评论 #25424415 未加载
评论 #25423364 未加载
评论 #25423251 未加载
评论 #25424185 未加载
评论 #25426315 未加载