Their torrent app (the pirates) will simply discard the bytes you are seeding as bad due to CRC checks. Then you will get banned by that IP for being a repeat offender.
Torrents: Kann ich meine Software durch Senden falscher Bytes schützen?
Es ist ein Thema, das alle interessiert. Wie kann ich meine Software vor Diebstahl, Hacking und Reverse Engineering schützen?
Ich habe mir gedacht: Tun Sie mein Bestes, um das Programm für das Reverse Engineering zu schützen. Dann werden die Leute es knacken und mit Strömen säen . Dann lade ich meine eigene gecrackte Software mit einem Torrent mit meiner eigenen Torrent-Software herunter . Meine eigene Torrent-Software muss dann falsche Daten (Bytes) säen. Natürlich muss es kritische Bytes geben.
Leute, die meine Software stehlen wollen, laden also meine falschen Bytes herunter. Nur die Bytes, die für das Starten, Speichern und Laden von Daten usw. wichtig sind. Wenn der Stealer von mir herunterlädt (und später sät), kann der Stealer nichts damit anfangen, weil er defekt ist.
Ist diese Idee relevant? Vielleicht überprüfen gute Torrent-Clients Hashes von anderen Peers, um zu prüfen, ob die Pakete (die meine defekten Bytes enthalten), die ich samen möchte, korrekt sind oder nicht.
6 Antworten auf die Frage
- Beliebte
- Neu
- Mit Kommentaren
- Aktiv
Q. Can I protect my software by sending wrong bytes?
A. No, it can be hacked around anyway, especially if someone gets their hands on a legit copy.
Q. How can I protect my software against stealing, hacking, reverse engineering?
A. Sell it for a fair price, this will undermine attempts to hack.
I'd suggest to approach the problem from the other end. Embed a unique identification code into each copy of your software that you give to your clients. In case somebody is seeding, you can at least identify who did it and take legal actions.
Does DRM work? No. Does setting up bad BitTorrent/EDonkey2000 stuff work? No. Does anyone care about pirating your little application? No. Nobody has ever heard of it.
bittorent and most other good p2p software protects itself from such kind manipulation by using file hashes, e.g. md5.
t's a topic that everyone interests. How can I protect my software against stealing, hacking, reverse engineering?
The only way (I can think of) to do it is to run software completely on your server, and have no useful code in client application - because if you can't get it, you can't (easily) crack it. This way you'll have control over accounts and you'll know who uses your application. Users won't be happy, though. And if you'll only run copy-protection-related code on your server, someone will hack it by writing server emulator OR they'll identify code and bypass protection completely. As it happened with new Ubisoft copy-protection scheme.
Keeping software on server isn't completely bulletproof. Instead of cracking the software, someone will start attacking your server in order to break in and to get software. And there is always "social engineering" security holes. "keep everything on server" will work best if your software cannot be run on normal machine (i.e. it requires supercomputer or computer cluster). A good example of this is EVE Online - unlike WOW and Lineage there are no server emulators I know of, because it requires computer cluster to run the server.
My own torrent-software has then to seed incorrect data (bytes). Of course it has to seed critical bytes.
- If you'll try to "hijack" existing torrent, any sane client will report CRC errors and ignore your client. All p2p software uses hashes.
- If you upload "wrong" torrent, another user will report your torrent as fake, so no one will download it.
stealer
"Pirate", because it is called copyright infringement.
Verwandte Probleme
-
4
Konfigurieren Sie das Modem für Bittorrent-Downloads
-
2
Wie erstelle ich einen Torrent und teile ihn mit anderen?
-
1
Kann man sehen, welche Torrents ein Server / Tracker hostet?
-
5
Kann ein Torrent mit null Sämaschinen herunterladen?
-
2
Warum lassen bestimmte Torrent-Tracker mich nicht hochladen?
-
4
Erweiterter Router - Power Networking
-
5
Wie kann ich die BitTorrent-Drosselung umgehen?
-
6
Gemeinnützige Nutzung der Upload-Bandbreite?
-
4
Ausblenden der IP-Adresse bei der Dateifreigabe
-
22
Wie kann ich erklären, warum DRM nicht funktionieren kann?