Bypass usb dongle key11/19/2022 ![]() Why don't you just reverse-engineer the silly thing and make a video out of it. To me this shows how effective this rubbing of off part numbers is. I stopped the video right there, because the chances of even attempt of for example sniffing an I2C bus would be slim. So you start with a video of a teardown, open the thing, then you laugh at the rubbed off part numbers, yet immediately back away and start rambling about random guesses. Does this clarify your doubts? Regards, Vitor The mother company did not do this work themselfes, because they were not aware of the amount of cracks and illegal use of their software at that time - they did not sell the licenses to the end user. No we were not paid for this "service". This would help discussing the situation with the customer and negotiate a friendly deal to get them onto the legal side. when 1 license was purchased but several instances being used). As a side effect I would be quickly able to identify illegal use of our software at companies (i.e. Software got better protected, which was good for us. I then sent those cracks and findings to the mother company for development to fix the cracks. Again, I basically just read the instructions (Readme.txt) and/or installed them on a virtual machine. I regularily googled for cracks for our software or they were provided to me by some customers (who suffered from other companies using cracked software and thus being able to offer cheaper prices) and tried to see how these cracks worked (bypassing FlexLM, dongle checks, etc.). Anyway, to answer your questions: - Yes, we suffered from pirated software back then - not so much nowadays. You could have simply used and extension cable to move the dongles to a more suitable location. Also, it seems an odd thing to do in a company, that purchased a legal license. ![]() Additionally it was for sure a direct violation of the license agreements. " That certainly is/was an illegal thing to do, especially if you were located in the US, since reverse-engineering and/or extracting key data out of the dongle is against your laws. ![]() Tired of reading the EEPROM with the programmer, it was easier just to read it with software and store the file. Where did I say that I was cracking the software we are distributing? On the other hand, you claimed: "I wrote the reader after I had upgraded Altera with which they supplied me with a new dongle. And yet in this new post of yours, you keep implying that once again. The rudeness of your comments comes from your assumtion of me or my company practicing any illegal activity. We had many issues with schools for this reason, to a point where these dongles where actually stored inside the computer with a USB extension cable going from the external USB port inside the case. For there the USB dongles goes to the trash. The biggest risk of USB dongles, by the way, is that they are mistaken for USB disks and are stolen for that purpose! The person stealing it thinks it is a USB memory and when it doesn't work as such, they think it is broken and that this was the reason it was left behind. ![]() So it is understandable that a company goes that route. While this is kind of "amateur hour" stuff, such a dongle costs probably around 1-2 Euro and is still quite effective. ![]() To make them "unique" you can use for instance use setup tools to configure the microcontroller and create read only partitions or set the drive capacity to some odd number which would be difficult to obtain with a standard dongle. That is probably not even a real dongle but rather a modified USB disk drive! Some companies, not wanting to spend real money on real dongles, resorted to USB drives. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |