Hello,
More of my precision about more of my philosophy of how reverse engineering the code is so difficult to prevent..
I am a white arab from Morocco, and i think i am smart since i have also invented many scalable algorithms and algorithms..
I think i am really smart, and i will make you notice the following pattern that i can detect with my fluid intelligence:
Look at how the software company called Ubisoft has only managed to protect Assassin’s Creed Origins from pirates for a month using also the best tool that is VMProtect:
https://www.dsogaming.com/news/ubisoft-managed-protect-assassins-creed-origins-pirates-entire-month/
So i think that the weakness of reverse engineering from the above pattern, it is that it is easy for reverse engineering the code so that to "crack" the software , like they have done it for Assassin’s Creed Origins above, but it is so difficult for
reverse engineering the code so that to understand the meaning of the difficult algorithms in the code, also i can logically infer that the second weakness of reverse engineering is that you can give the binary code that is cracked with reverse
engineering, but with this kind of way of doing you have to be aware that the cracked binary code can contain a virus, this is why a "trusthworthy" relationship between a software developer or developers and the customers is so important. And it is my
way of doing that is creating a trusthworthy relationship with my customers and with you here in those newsgroups forums and such, and read my previous thoughts so that to understand more my way of doing:
I think that the best software for preventing reverse engineering the code is the following software that is called VMProtect:
https://vmpsoft.com/
But i think that one of the best protection against reverse engineering the code is also using virtual machines, but this way of doing has a weakness, since when a sample is protected with a VM, the only way to reverse engineer the code itself is to
start with understanding the VM, but from what the experts know, a lot of VMs have two things in common:
They are not complex (sometimes the bytecode instructions themselves are just decoded into x86 instructions - usually some VM instructions as well), and they are usually quite obfuscated, so you will need to reverse engineer the VM and understand how it
is decoding bytecode instructions - and what each VM instruction does, and then you can use that knowledge to transform bytecode back into its original form - at which point you can analyze it in IDA Pro etc.. Usually, the not so difficult part for the
experts in reverse engineering the code is understanding the VM despite obfuscation, so i think you can not be safe from reverse engineering the code, and so that to notice it, look in the following web link at how the software company called Ubisoft has
only managed to protect Assassin’s Creed Origins from pirates for a month using also the best tool that is VMProtect:
https://www.dsogaming.com/news/ubisoft-managed-protect-assassins-creed-origins-pirates-entire-month/
And i think that China has a lot of experts in reverse engineering the code, so i think you can not be safe from reverse engineering the code in China.
But here is my way of doing:
More of my philosophy about copyrights and about patents and about
reverse engineering and more..
I am smart, and i will talk more about reverse engineering, so i think that the creative ways to break disassemblers or debuggers or by using source code Obfuscation or by virtual machines... are not so efficient against reverse engineering, so i will
give you my smart way of doing it, first as i have just told you, that you have to protect your value-added of your code that you want to sell by for example using more difficult or difficult algorithms in a smart way that are more difficult or difficult
to understand with assembler code from machine code, and after that you have to use copyright in a smart way, for example i will use like the following service from a company in Canada that provides a copyright filled and certified by a public notary
that is valid for 172 countries, you can read about it here:
http://en.scopyright.ca/
But you have to be smart, since the "patent" that protects an algorithm is not valid in so many countries such as India etc., so the best way is to use a copyright as i am doing it, so that this kind of copyright allows you to fill a lawsuit against
binary code that is stolen from you by asking the one that has stolen from you to show his source code in
a legal lawsuit.
Thank you,
Amine Moulay Ramdane.
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)