Turn off the Ad Banner  

To print: Select File and then Print from your browser's menu.

    -----------------------------------------------
This story was printed from CdrInfo.com,
located at http://www.cdrinfo.com.
-----------------------------------------------


Appeared on: Sunday, February 17, 2002
CD Protection Overview


1. OverView

CD Protection OverView

Introduction:
Into our days companies CD protection methods are increasing and try to be always 1 step ahead from people who try to make copies of it. Here you will find out the latest news about CD protection methods and if they really work.

What is copy protection?
The binary information can always be copied, so the manufacturer makes the operation of his program dependent on the presence of some physical key which cannot be copied. He does this by changing his software so that it cannot run unless some sort of initialization is performed, adds additional program code, called the guard module, which carries out the necessary initialization if and only if it detects the presence of the physical key. In a few words : "Copy Protection is a modification to the original code to make it dependent on some external action, a guard module to provide the necessary action when it detects the key & the key itself."

How does it work?
All copy protection schemes must have these three parts in order to work. If any part is missing, the scheme fails :

Dependency on External Action
The original software must be changed in some way so that it will not run without the action of the guard module. This could consist of merely including calls to the guard module in the software. However, the best way of making the software initialization dependent is to encrypt it. Encryption means taking the code and scrambling it so that it cannot run and is no longer recognizable.

The Guard Module
This is the code that restores the software to executable form or in some other way initializes the software and allows it to run. It must do this only when the key is present. When the guard module is satisfied that the key is authentic, it initializes the software and executes it. Besides the function of recognizing the key and restoring the software to executable form, the guard module must do its job in complete secrecy.

It must be impossible to see what it does, impossible to imitate what it does and impossible to trick it into doing its job when the key is not really present. This is called code security. Unless, the guard module itself is protected in some way, usually by encryption and debug-trapping, the protection can be disabled, and the software made to run without the key.

The Physical Key
This is the actual physical device or object that must be present as proof of ownership and the right to use the protected program. The key can take on many forms: an original CD, a key diskette, a dongle or a "smart card".

What makes the software dependent on Guard Module?
There are various ways to do this, though techniques which do not include encryption cannot be considered very safe : Building in Calls to the Key Check, Encryption

Which are the Guard Module functions?
Key Detection
Initialization
Code Security
Debug Trapping

What are the various kinds of physical keys?
Key Diskette
Original CD
Dongle
Hard Disk
Other Hardware ( plug-in board,smart cards)
Personal Characteristics (finger prints, voice prints or retinal images)

So how do people manage to break it? What they do?
-
Reverse Engineering
By disassembling the program and finding out how it works, another programmer might use the principles involved to write his own program without actually copying the program itself. This process is time consuming and difficult.

- Creating a "Cracked Copy"
If the protection can be disabled, the software will run without the key. The idea is to either peel off the guard module or find some other way to defeat it, so that the protection check is never made, but the initialization is made anyway. This is very easy now since CloneCD can copy most of current CD Protections.

- Copying the key
If this can be done easily, it is almost as good as creating a cracked version. Dongles and diskettes with physical holes are extremely difficult to copy; for all practical purposes they cannot be copied. Key diskettes made from normal diskettes can or cannot be copied depending on the degree of sophistication of the diskette and of the equipment attempting to copy it.

Commercially available copying boards can defeat many protection schemes. For the serious pirate, there is the synchronized bit copier which moves every bit directly from one diskette to another, using electronically synchronized drives. This can copy all but the very best key diskettes.

- Fooling the Protection
A memory-resident program can be installed which makes the guard module "think" the key is present. If, for example, the guard module checks the key diskette or dongle by way of the system BIOS, a filter can be set up to watch the interrupt and intervene when the key check is made, feeding false input to the guard module and simulating the expected signals.


2. CD Protections

CD Protections

CD Protections methods devide into several sub-directories about how protection is made. Note that almost all CD Protection can be copied with CloneCD. Read more into CloneCD review . Here is an comparion table which shows the general capabilites of each method :

( Source : Hide & Seek Technologies )


3. Cactus Data Shield

Cactus Data Shield
(MidBar Tech)

History:
Midbar is a dynamic company specializing in Copyright Protection Solutions. Midbar's mission is to lead the fight against copyright piracy making its innovative Embedded Masking Technology the global industry standard. Midbar is a privately owned company with its R&D center in Tel Aviv, Israel.

Midbar specializes in Copy Control Solutions of music CDs and other optical formats for all applications, whether music, software or video. Midbar's Cactus Data Shield protects music CDs against unauthorized digital duplication. Transparent to the music provider, this breakthrough technology is easily implemented in the CD manufacturing process. Transparent to the consumer, CDs protected by Cactus Data Shield play on commercial CD players with perfect audio quality.

Products: Cactus Data Shield

The Cactus Data Shield is based on Midbar's Embedded Masking Technology, an innovative technology offering unprecedented comprehensive protection against unauthorized digital duplication of music CDs and other optical media formats. Cactus Data Shield is a one-station, automatic device installed in-line between the data processing station and the LBR mastering system, with no production machinery modification or changes to the pre-mastering process necessary. A compact stand-alone system, it can also be easily and seamlessly integrated with mastering and production equipment.

Transparent to the content provider, there is no need to modify content or its delivery systems. Cactus Data Shield does not affect the pre-mastering process or require production machinery modification. Fully transparent to the consumer, there is no need for software keys, hardware dongles, plugs or other external equipment or processes. Cactus Data Shield protected CDs and DVDs operate on existing commercial players. By preventing conversion of content to other digital formats that can be transmitted over the Internet such as MP3, Cactus Data Shield prohibits Internet-piracy.

Protects the media master Easy to install - compact, stand-alone hardware platform between the data processor and LBR Easy to implement - automatic, one-step process Requires no change in existing production equipment Transparent to existing pre-mastering and mastering process Simple verification of the media master provides quality assurance Option to integrate technology with production equipment.

How it works?
Cactus Data Shield trick is quite smart! The Audio protected CD is made in such way that it confuses most CD-Rom drives. The TOC contains false position for the Leadout (at 30secs). Also the length of the last track is read false and the CD-Rom cannot read the real length of it so it stops reading..If you try to play a Cactus CD the CD-Rom stops playing the CD after 28secs and returns false info about the tracks length. So the real problem here is the way that most CD-Rom read the CDs.

Price:
No info is avaiable in website...

How to recognize it:
Possibly the AudioCD will have a note "CD Protected" or "It will not play at CD-Rom"...('Razorblade Romance' von HIM und 'My Private War' von Philip Boa & The VoodooClub).

Does it work in real life?
Nope with Plextor drives! You can read such CDs and with CloneCD you can additional remove the Cactus protection from the protected AudioCD. For the rest CD-Roms the Cactus protection will work just fine...


4. CD-Cops

CD-Cops
(Link Data Security)

History:
Link Data Security A/S, founded in 1982, is a Danish company which has been marketing security products since 1984 when the first version of Cop's Copylock for DOS was released.

Link offers a complete line of protection for programs running under DOS, Windows and NT. The protected applications can be distributed on diskettes, CDs, DVDs, or via the internet. In each case, the application is locked either to an original diskette, an original CD, an original DVD, a particular machine ID, or an access-code.

Products: CD-Cops

CD-Cops recognizes an original CD-ROM and thereby rejects all copies: those produced on a CD-R burner, as well as those produced by "professional pirates" on glass masters.

The software which recognizes and either accepts or rejects the CD is itself protected by Link's code security, a system which has been in use since 1984 and is known throughout the world as being virtually unbreakable.

CD-Cops supports DOS, Windows 3.1, 3.11, 95 & 98, as well as NT, OS2 and all varieties of network: client-server as well as peer-to-peer. All currently available CD-ROM speeds are supported.

Other product : CD-Cops NET (network solution)

How it works?

After applying the protection you produce a series of CDs in the normal way. No special equipment is necessary. When you receive the shipment of CDs, which have all been produced from the same glass master and are therefore identical, you run a utility which measures one of the CDs and extracts an access code. This code, which is entirely public, is then included with the CD when it is sold, either as a label, enclosed in the package, or silk-screened onto the CD.

During installation of the software, the user enters the access code. This is done only once. From then on, the software runs only when an original CD is inserted in the CD-ROM drive. The data itself can reside either on the CD or on the hard disk, but the original CD must be present.

If a pirate CD is inserted into the drive, the software will refuse to run. Each time a new batch of CDs is produced, a new code must be extracted: one code per batch.

Price

There is a one-time startup fee of $2000 for the CD-Cops Single-User version. The startup fee for the CD-Cops Network version is $3500. Get both CD-Cops Single and CD-Cops Network for $5000.

How to recognize it

The file CDCOPS.DLL can be found in the installation director and also Files with the .GZ_ and .W_X extensions.

Does it work in real life?

CD-Cops protection works pretty well against CloneCD. For this reason Link Data Security have this posted in their homepage as an plus (+) for their protection. However there are other tools other than CloneCD which will help you break the protection (actually decrypt protected files).


5. DiscGuard

DiscGuard
( TTR Technologies Inc.)

History

TTR Technologies Inc. was established in 1994, and since February 1997 has been publicly traded. The company's US offices are located in New York and Silicon Valley. The company's research & development, as well as sales for the Middle East and Europe are handled through TTR in Israel. TTR has distributors in Japan and China, and sales representatives in South Korea and Singapore.

Product: DiscGuard

DiscGuard is an anti-piracy technology for optical media that works by putting a "signature" onto a glass master during mastering, using a specially enhanced mastering machine, or onto a CD-R via DG-Author, a forthcoming product (Q3 '99) consisting of a specially enhanced CD-R recorder with proprietary software. It effects two basic changes to the software package:

- The main executable files on a DiscGuard-protected CD-ROM are encrypted.
- A special digital signature is inscribed onto a pressed CD-ROM, and mapped into a software decryption key. The digital signature is not reproducible by either counterfeiting (re-mastering) or disc burning.

When an authentic disc is used, the signature is present, decryption occurs and the application runs. The user is not even aware that the product is protected. When a copy is used, the signature is not present, no decryption occurs and the application does not run. Instead, a message, a limited demo, a link to an e-commerce web site or a presentation is launched. This transforms every illegal copy into a marketing tool and revenue generator.

How it works?

There are three main steps needed to make DiscGuard protected CD-ROMs

A.Protection: The software publisher protects the application using TTR's DG-Protector software. DG-Protector encrypts the executable files (.EXE's) and adds the ability to detect a valid DiscGuard signature. To verify that the application of anti-piracy protection has been successful, the publisher may install and test the protected application using a TestKey.

After testing, the publisher burns a "Client Master" CD-R containing the complete software package, including the protected files, and sends it to a DiscGuard authorized mastering & replication plant with the order documents.

B.Premastering: Production of a DiscGuard premaster from the Client Master, using TTR's DG-Works software at a mastering facility. The premaster contains additional information needed to produce a digital signature, to be used by the mastering machine.

C.Mastering: A TTR-authorized mastering facility creates from the premaster a glass master containing the DiscGuard signature. After mastering, replication proceeds.

Price: Not available (at website)

How to recognize it

Theses files : IOSLINK.VXD  and IOSLINK.SYS can be found on CD or Installation directory

Does it work in real life?

DiscGuard is also the second protection which cannot be copied with CloneCD. However again there are several tools out which will help you overcome this protection and <backup> your favorite CD.


6. LaserLock

LaserLock
(MLS LaserLock International)

History

MLS LaserLock International is an innovative company specialized in Research & Development of software protection products & services. The company was founded in 1989, in Thessaloniki Greece, for the purpose of Research & Development in Information Technology and Software Protection Systems. MLS LaserLock International is the first company to ever develop a Complete Software Copy Protection System especially for CD-ROM. LaserLock has been increasingly gaining worldwide acceptance since its very successful emergence in the international market, over 4 years ago.

Product: LaserLock

LaseLock CompanyLaserLock is a product that provides CD-ROM anti-copy security and integrates many protection modules (single and/or networked applications, LANs, Demos, Mixed-mode CDs, Hybrid-mode CDs, etc.) under a variety of operating platforms (Windows v3.xx, Windows 9x, Windows NT, DOS, etc.).

LaserLock uses a combination of encryption software and unique laser marking on the CD surface made during the special LaserLock glass mastering procedure, in order to make copying virtually impossible. Every CD-ROM application has a unique locking parameter that provides a complete protection against illegal re-mastering and reproduction.

LaserLock consists of the following combination:

Sophisticated Code Encryption software
Physical Signature on CD, made during a unique and special glass-mastering process
Debug Prevention software engineering embedded in the s/w code

How it works?

Step

Description

Input

Output

Duration

No 1

Complete the "Application Description" Form A1 & "LaserLock Order" Form 2 and return them along with the original master CD-R to your closest authorized LaserLock provider.

Application

Form A1, Form 2 & CD-R

No more than a few minutes

No 2

According to the "Application Description", MLS will prepare a certain set of files and libraries that will be used to implement LaserLock coding into your application.

Form A1 & CD-R

Set of files and libraries

No more than ½-1 hours

No 3

Highly trained software engineers will implement and link the LaserLock code into your application. The creation of a new CD-R, containing the complete application with the LaserLock code embedded, will be completed.

Set of files and libraries

New CD-R

No more than 2-3 hours

No 4

You will then receive five (5) silvers for your own testing. Upon your approval, you will receive either the final product or the LaserLock stampers in order to proceed to mass pressing at a factory of your choice.

New CD-R

Final product or stampers

No more than the usual time needed

The system requirements shown below, must be fulfilled in order for MLS to carry out the LaserLock implementation for you:

The main executable file(s) to be protected should preferably be in 32-bit format; should the main executable file(s) be in 16-bit format, please contact our technical department for further instructions.
- If a setup utility is used to expand and copy the compressed main executable file(s) onto the HDD, please ascertain that full access to the uncompressed main executable file(s) is provided.

The LaserLock system occupies between 12 to 20 MB of disc space, depending on the specifications of the application to be protected. Please ensure that at least 20 MB of free space are available on the gold master CD-R.

Price: Not available (at website)

How to recognize it

There is always a hidden directory called "LaserLock" at the root of the CD, this directory usually contains few files that are full of unreadable sector. Moreover , a little thin circle containing theses unreadable sectors can be seen on the CD.

Does it work in real life?

Not really...CloneCD can copy this protection entirely. ;)


7. LockBlocks

LockBlocks
(Dinamic Multimedia)

History:
-

How it works?
The LockBlocks protection is based in unreadable sectors. All CD's which are protected with LockBlocks seem to have 2 visible circles, one about 5 mm, the other 3 mm, which causes lockups to CD-Rom when trying to read it.

Price: Not available (at website)

How to recognize it:
Check for two visible rings (one thin ring and one thicker one) on the "data side" of the original CD.

Does it work in real life?
Not so effectively since with an good software which had good skip errors machine (CloneCD, BlindRead) can <backup> the CD.


8. MusicGuard

MusicGuard
(TTR Technologies Inc.)

History

TTR Technologies Inc. was established in 1994, and since February 1997 has been publicly traded. The company's US offices are located in New York and Silicon Valley.The company's research & development, as well as sales for the Middle East and Europe are handled through TTR in Israel. TTR has distributors in Japan and China, and sales representatives in South Korea and Singapore.

Product: MusicGuard

MusicGuard? is an anti-piracy solution that protects CDs from unauthorized copying. It is the only answer available today to the illegal copying of CDs. MusicGuard? protection is completely transparent to the consumer. CDs protected by MusicGuard? can be played in CD/DVD players and CD/DVD drives available today. No changes need to be made to the player. If a pirate or other user attempts to make a copy of a MusicGuard? protected disc by using any of the CD to CD copying programs or track rippers either the copy process itself will fail or the copy produced will be unusable.

How it works?

MusicGuard employs two layers of protection to inhibit digital copying of CDs. The first line of protection is a copy prevention technique that renders the protected CD difficult to copy. The second line of protection is a mechanism that acts to reduce the quality of digital copies of a protected CD. The net result is that a MusicGuard? protected CD is playable, but is difficult to copy faithfully.

MusicGuard protection is on the CD itself and is introduced as part of the production process. During the glass mastering process, a specially modified CD-encoder introduces selective alternative alterations to the EFM data stream. These alterations do not affect the audio quality of the original CDs in any manner. CDs protected by MusicGuard play normally in the existing base of CD/DVD players around the world.

Music quality is exactly the same, as it would be if the CD were not MusicGuard protected. When one tries to make a copy of a MusicGuard? protected CD with any of the many CD-to-CD copying programs or "track rippers", the copy is unusable. Either the copying process itself will abort or the quality of the unauthorized copy will be unacceptably inferior to the original music. Similarly, attempts to produce MP3 files from a MusicGuard protected CD will either fail or result in inferior and unusable audio

MusicGuard leverages existing encoder technology used in TTR's DiscGuard software protection product. Glass Mastering facilities worldwide will be able to simply and immediately upgrade their existing encoders to enable the use of MusicGuard. Since MusicGuard protection is applied only during the glass mastering process, once a glass master and stampers have been produced, discs can be replicated as usual by any replicator.

Price: Not avaible (at website)

Does it work in real life?

Since now 2 music companies agreed to use it..Since we don't have seen till now a MusicGuard protected CD we cannot tell for sure that will not be able to copy it..


9. ProtectCD

ProtectCD
( VOB )

History

VOB was founded 1990 as a partnership in Dortmund, Germany. The development priority was the development of technologies in the field of information storage. Later on the hardware unit was sold and the company focused on development of the best possible software for optical data storage.

In 1994 VOB incorporated into a "GMBH" and the OEM and VAR business became more and more important. Due to this fact VOB started an own business unit for OEM /VAR customers in Europe and the USA for optimal support.

Product: ProtectCD

ProtectCD is an protection that does not change the protected data but writes a special copy protection information in a different area accessible only by the ProtectCD detection services. Because there is really no change in the data delivered to the manufacturer the system is as compatible as the unprotected CD.


ProtectCD provides the following :

Programs protected with ProtectCD run on every normal PC with the key CD in a CD-ROM compatible drive. The programs can be delivered directly on the CD, by internet or in any other way you want. ProtectCD protected CDs can't be copied by any known CD-Recorder and CD-Copying program because of the additional individual ProtectCD area on the CD. Only registered manufacturing plants are able to create ProtectCD CDs and therefore any pirate CD plants are unable to produce these CDs. ProtectCD does not confuse the user with difficult serial numbers or codes. The user can handle the CD exactly like any other CD (except copying).

How it works?

ProtectCD is available in two different levels. The main differences between the two levels is the ease of applying and the protection they grant. Anyone who is requesting the first time a ProtectCD Project Authorization Code will receive the software for both protection levels. While level II consists of a SDK with lib files which need to be embedded into the program at compile time the level I is an executable wrapper which modifies the file to protect automatically.

The advantage of level I is that no access to the source code is needed and the implementation could be done very fast and easy by using the ProtectCD EXE Wrapper. The disadvantage of this solution is that the protection is only checked once at the start of the program and the reengineering of the code is theoretically easier, although it is still unbroken.

With the level II the reengineering if significant more difficult and the protection can be checked whenever the programmer wants to. The disadvantage of using this level is that the implementation takes far more time and more engineering know-how is needed.

Price

The costs consist of a single payment (US$ 1500) for each project and an additional fee on a piece base. The single payment has to be done directly to VOB whereas the piece fee has to be paid to the manufacturing plant.

Does it work in real life?

CloneCD can handle this protection and make a safe <backup> from your favorite CD.


10. SafeCast

SafeCast
(C-Dilla)

History:

C-Dilla Limited is a UK based Technology Company specializing in applications based around content protection and secure transactions for digital media. This includes copy protection for CD-ROM and DVD technologies; secure transmission of data and applications from Web sites; and financial transaction clearing across the Internet.

Product: SafeCast

SafeCast is a software tool that enables publishers and resellers of software and information products to actively protect and manage control over their products. SafeCast lets you deal with your customers in the way that best suits your business and products:

Independent of the delivery media - products can be shipped on CD-ROM or downloaded from the Internet. Communication of registration and purchase information and the granting of license rights via the Internet, by telephone or fax. An advantage of the SafeCast technology is that a software-based encryption toolkit is made available to the publisher in order to allow complete control of the encryption process. It does not require professional mastering and replication and can be burned directly on gold discs. Once a publisher encrypts the gold disc they can distribute it directly to end users who are then required to contact the publisher directly or via a web site to obtain access keys to play the program. The access keys eliminate hardware dongles or other security mechanisms which often interfere with playing a particular pre-release program.

How it works?

SafeCast can be implemented as a "try and die" solution where the encrypted discs expire on a pre-determined date without any further publisher intervention. The "try and die" implementation is ideal for software sent to journalists and reviewers or other third parties who would benefit from temporary usage, but who should not be inconvenienced by security.

SafeCast operates transparently up until the time the disc expires. In a similar fashion can also be used to help implement "try before you buy" programs, allowing for controlled usage or extended demonstrations of titles prior to purchase by consumers.

Price: Not available (at website)

Does it work in real life?

In France, the well-known "Encyclopaedia Universalis 5" use this protection. We never test such CD in order to know if we can <backup> it.


11. SafeDisc

SafeDisc
(C-Dilla)

History

C-Dilla Limited is a UK based Technology Company specializing in applications based around content protection and secure transactions for digital media. This includes copy protection for CD-ROM and DVD technologies; secure transmission of data and applications from Web sites; and financial transaction clearing across the Internet.

Product: SafeDisc

SafeDisc is designed to prevent CD-ROM based software being stolen by copying to either a hard disk, a "Gold" CD using a CD writer or professional remastering to a silver CD. Use the CD as a "key disk" so the original CD must be present in the drive for the software to run.

How it works?

The SafeDisc is comprised of three key features: (1) an authenticating digital signature, (2) encryption that protects the content, and (3) anti-hacking software.

During premastering, the content is encrypted and carries with it authentication instructions. A unique digital signature is subsequently added to the title during mastering. When a user plays an original disc, the authentication software reads the digital signature allowing the program to be decrypted and to play normally. This authentication process is transparent to the user. The original CD must be present in the CD-ROM drive to allow the authentication to occur.

When attempting to make an unauthorized copy with a CD-R or with professional mastering equipment, the digital signature is not transferred to the copy. When an unauthorized copy is played back, the absence of the signature will prevent decryption of the program and the copy will not play..

SafeDisc also includes anti-hacking technology that prevents the compromise of its security features. The anti-hacking technology is designed to not only deter casual copying, but also to provide strong resistance to destructive hackers and commercial pirates.

SAFEDISC is designed to work with standard premastering,mastering, and replication processes. During premastering, the publishers' content is encrypted using a simple software toolkit. The encrypted content is then transferred to the Gold Disc in the usual manner.

 

At the mastering stage, the digital signature is added to the Glass Master using a Laser Beam recorder controlled by Doug Carson Associates(DCA) Mastering Interface Software (MIS). DCA is the leading mastering software supplier on the market today. The replicator then produces the required quantity of CD-ROMs and performs signal and data verification testing.

Price: Not available (at website)

SafeDisc ProtectionHow to recognize it

This protection is very visible in 2 ways:
- every CD protected will always have at least a file called "0000001.tmp" and most of the time also these files : clocksp.exe , .iCD file , CLCD16.DLL, CLCD32.DLL. File named "clocksp.exe" also have specific icon.
- This type of CD includes lots of unreadable error . It usually have about 10000 unreadable sectors (usually start at sector 800+ and end at 10000+, see test for details) which represents about 20 Mb in fact.

Does it work in real life?

Not so good as C-Dilla would like... CloneCD can handle this protection and make an <backup> of your favorite CD. There are also several tools which can play copies of SafeDisc CDs without needed to use CloneCD. You can find them over here ..


12. SafeDisc 2

SafeDisc 2
(C-Dilla)

History

C-Dilla Limited is a UK based Technology Company specializing in applications based around content protection and secure transactions for digital media. This includes copy protection for CD-ROM and DVD technologies; secure transmission of data and applications from Web sites; and financial transaction clearing across the Internet.

Product: SafeDisc 2

Macrovision at 18 of August 2000 posted the press release for SafeDisc v2.0.

What's New?

o API support - the SAFEDISC toolkit includes an API that will allow publishers to extend the SAFEDISC security to encrypt various functions contained in their content.
o New architecture - major re-architecture of the SAFEDISC code to disable automated hacking tools and to include additional encryption to delay hacking.
o Disc burning prevention - introduction of additional digital signatures to improve resistance against copying.
o Fail-safe manufacturing - assures that SAFEDISC masters will only be mastered on SAFEDISC-enabled production lines.

How it works

The first game, which includes the new SafeDisc v2.0 protection, is Red Alert 2. People have reported that you can easily copy the CD BUT it will run at CD-ROMs, only at the CD-RW drive, which the backup created!! If you try to install it at CD-ROMs you will get an error during the setup process (error in .tmp file). People also have reported that in some cases even original CDs refused to install at many CDROM drives.

SafeDisc v2.0 technical background (from CloneCD Author)

As you know, there is a new copy protection, which can not always be copied with CloneCD. For example, you can find it on the CD "Command & Conquer - Red Alert2" and on some others as well. Let's call this protection SD2. SD2 is a very interesting beast, as some of you already know. Sometimes a copy works only in the CD-Writer, sometimes not at all. Sometimes - depending on the writer used -in any CD-ROM. Some people claim, that they had success with other burning software. Let me explain, what the reason for all this might be. (I say "might be", as the information here is just revealed through observation, but I believe I am at least pretty close).

The first funny thing is, that if a SD2 copy doesn't play in a CD-ROM, this copy has additional bad sectors, which weren't on the original. As CloneCD reads and writes "as is!", I would have assumed, this is simply impossible. So, if you are a curious guy, you can look at these sectors on the original CD (where they are readable). You will find a lot of garbage on the first view. But if you run these sectors through a sector scrambler (a device, which is in every CD-ROM and CD-WRITER) you see the reason for all the trouble: Regular patterns like 'XYXYXYXYXY...' and so forth. And this is exactly how the protection works. To understand this, you need to know, what the scrambler is used for (from ECMA-130, ISO/IEC 10149):

"A regular bit pattern fed into the EFM encoder can cause large values of the digital sum value in case the merging bits cannot reduce this value. The scrambler reduces this risk by converting the bits in byte 12 to 2351 of a Sector in a prediscribed way. ..."

The sectors I have mentioned above try in fact to overload the EFM encoder of the CD-Writer, because *AFTER* passing the scrambler the poor device has to write *REGULAR BIT PATTERNS* - something it really doesn't like. After some quick tests, it seems, that some writers are affected by this problem more than others.

For example, writers based on Philips hardware (Philips, Fujitsu/Siemens, Acer, just to name a few) are NOT affected by this at all. With such a writer, you can copy SD2 with any CloneCD version, and the copy will run on every CD-ROM. Most other writers will not write these sectors correctly. Some writers (Plextor) can at least read the copy they've made, so the copy will run in the writer, but not in an ordinary CD-ROM. The reason for this might be, that the writer is able to position better, but this is just guessing.

I must admit, this is a very, very cool protection: Something is on the original which can be read, and not be written. I really didn't believe such a protection is possible. Now for the interesting question: Will CloneCD ever be able to overcome this problem?

Well, you can answer this yourself: I guess not. Okay, you can probably do nasty tricks like modifying the pattern. But this isn't what CloneCD is about. It is called CloneCD, not PatchCD. In opposite to the belief of some people, CloneCD does not cheat or modify data in any way. I like to keep it this way. Will any other software overcome this problem? Again, you can answer this yourself: No, unless they are cheating somehow. Can a firmware update fix this? Maybe. But I have the strange feeling that the problem resides in the writer's chipset, not its firmware. Maybe a firmware workaround would be possible. But who would be so nice to modify the firmware in this regard? Conclusion: Either use your Plextor writer to play the copy, or buy a unit based on Philips hardware.

Price: Not available (at website)

Does it work in real life?

NAs it seems C-Dilla managed to make a pretty tough protection since the backup will not work ,made with the majority of recorders, in every CD-ROM. However as CloneCD author suggested there are several recorders which can make perfect backups of SD2 protected titles with all versions of CloneCD.


13. SecuROM

SecuROM
(Sony)

History:
We all know who Sony is..

Product: Securom

SecuROM is a CD-ROM copy protection technology that identifies a 'genuine' CD-ROM by a special authentication mechanism. During Sony DADC's mastering process an electronic fingerprint is applied onto the glass master which assigns a unique number to each CD-ROM title.

The combination of the electronic fingerprint on the disc and encryption technology for authentication makes SecuROM a powerful system to protect your software against hard disk loading, content distribution via Internet, CD-R duplication and even professional piracy by mass replication. The unique electronic fingerprint of SecuROM cannot be copied by a disc-to-disc CD-R copy process, by hard disk loading or by professional glass mastering using the 'genuine' disc as input media.

How it works?

The disc authentication of a 'genuine' CD-ROM title is a combination of hardware and software protection and is tied to the main application which is defined by the software developer. A 'double-click' of the main program will automatically invoke the 'genuine' disc verification. There is no need for the end user to enter any numbers or codes, to make any phone calls to get a code or to be registered before running the program on a disc. Authentication of the 'genuine' disc will only take a few seconds and is hardly recognizable by the end user.

If the disc is identified as the original disc, the application will work normally with no effect whatsoever to the CD-ROM title. On the other hand, intellectual property copied from the original CD-ROM to a CD-R, distributed files via the Internet, or even counterfeit discs through professional mass replication will be identified as 'clone discs'. The main application of such discs will be locked and an error message will be displayed on the computer screen.

There are no special requirements for SecuROM .This CD-ROM copy protection technology supports Windows 3.1x, Windows 95 and Windows NT operating systems. SecuROM does not require special hardware. It works with existing SCSI, IDE and other CD-ROM drives on the market which must be the local CD-ROM drive on your computer.

CD-Audio tracks are not affected on a SecuROM disc which can be played on any existing CD Audio player. The 'genuine' disc identification can be tied to standard 16 bit (running on Win 3.1x, Win 95 and Win 98) and 32 bit Windows executables (running on Win 95, Win 98 and Win NT). The protection of your CD-ROM title will be done in-house at Sony DADC. There is no special programming for the developer necessary nor do you have to hand out your source codes. Simply specify your main executables on the CD-ROM that you wish to protect.

Price: Not available (at website)

How to recognize it

Most of the time, theses following files can be found on that type of CD : CMS16.DLL, CMS_95.DLL or CMS_NT.DLL ; but you may find CD protected with SecuROM that don't contain theses files.

So , another way to reckon it is to look at the barcode of CD , you will be able to distinguish a little "logo" with name "DADC" on it , (it only applies with Data CD since AudioCDs pressed by Sony also include this logo) (e.g  "Hachette 2000 Encyclopedie" is a French SecuROM protected CD that only contains "DADC" logo).

Does it work in real life?

Nope for CloneCD users. With the help of CloneCD they can take care of this protection. Also you can use several programs which can help you play SecuROM copies without need of CloneCD. You can find them over here.


14. The Copy-Protected CD & The Bongle

The Copy-Protected CD & The Bongle
(Hide & Seek Technologies)

History

Hide & Seek Technologies is a two-year Company, organized to bring an exciting new optical disc copy protection technology to the market. The Hide & Seek story began when a Colorado entrepreneur put veteran inventor Jerry Smith together with Dr. James Weldon, and formed Hide & Seek.

Product: The Copy-Protected CD

The Copy-Protected CD is based on HST's core technology, which enables the mass-production of ordinary CD-ROM discs that cannot be duplicated successfully on a CDR recorder. The Copy-Protected CD is the ideal medium for distribution of consumer software, as it prevents users from making unauthorized copies on CDR recorders.

Product: The Copy-Protected CD

The Bongle takes security to the Networked environment. The Bongle is a "dongle" on a CD-ROM. Dongles are devices, usually a small box that contains a chip which stores a unique serial number, which must be physically attached to the computer, usually through a serial or parallel port. The good thing about dongles is that they are hard to beat. Average users have no way around them, and even sophisticated computer users must have access to expensive and complicated data analysis equipment to crack the dongle's code. On the down side, dongles are expensive to manufacture, and users frequently complain of complications with the use of their serial or parallel ports when dongles are attached. The dongle is a good idea that is trapped behind a hardware problem.

The Bongle can provide all the security of a dongle, without the cost or inconvenience. Based on a copy-protected CD-ROM that can be mass-produced for pennies, the Bongle must be placed in a CD-ROM drive when the protected software is launched on a computer or workstation. Ideal for networked environments with shared software, the Bongle can identify authorized users, regardless of which workstation they use. Bongles are inexpensive because they're mass produced, and Bongles are secure, because they can't be duplicated on a CDR recorder.

The Bongle works because of modifications made during the CD mastering process. The result is a disc which the application software can identify as being unique. Software on The Bongle disc cannot be successfully copied onto recordable CDR discs.

How it works?

Unkown yet. Both products supposed to were released into 1998.

Price: Not avaible (at website)

Does it work in real life?

Since this protection is still at papers we don't know if it will work. :)


15. CD Protections using other means to "protect" the CD

CD Protections using other means to "protect" the CD

- OverSize/OverBurn the CD

How it works?

Some games are over 660 Mb in size so they can't be copied ,as most of the CD-Writers are not capable of writing more than 659 Mb to a 74 minutes CD-R. With the release of the 80 Minutes CD-R this "protection" is not that effective anymore. Usually there is no real Data in the OverSized part of the CD as some CD-Readers are not capable of reading this part of the CD, it is just used to make it a bit harder to make a backup of the original CD. (About Overburn read more here).

- Illegal TOC

How it works?

This protection can be recognized when looking at the CD tracks. Usually there seems to be a second Data track (usually after some audio tracks). The CD ISO standards don't allow this thus the name Illegal TOC. In most cases the second Data track is pointing to the first Data track. The original CD usually contains 4 (or more) files of about 600 Mb each which would impossibly fit on a normal CD when first copying all files to a local harddisk. So when you look at it with Windows Explorer it will look as the CD is some GB big!

- Dummy Files

How it works ?

This protections creates Dummy Files which are pointing to random parts of the CD which are already in use by other files. When copying the CD content to harddisk and trying to burn the CD, it seems that it the CD image is much bigger than the track size(s) on the Original CD (sometimes the tracks are over 2 Gb in size!). This protection is usually found in combination with the Illegal TOC protection to create a low budget solution against CD backup. With the release of the 80 Minutes CD-R this "protection" is also not that effective anymore.

- Physical Errors

How it works?

The CD is damaged on purpose. Most CD-Readers are not able to "copy" these kind of errors and will stop reading the CD. All above protection methods can easily overcome with CloneCD but also with most Software CD-Copiers (Nero, Padus DJ).


16. Console CD protection

Console CD protection

- Sega DreamCast GDROM

How it works?

GD-CD has 2 sessions which are seperated with a long space. Into that space there is a logo of Sega visible. You can easily copy the 1st but you cann't even see the 2nd and most important session which holds all data. The 2 sessions are separated with a large visible space. This is made in propose so the laser beam couldn't  even accidenlty reach the 2nd session and read it. I test also the PackeCD rumor and didn;t worked either. 2nd session is still unreadble. (Read more about DreamCast here).

- Sony PlayStation CDROM

How it works ?

Playstation CD have 2 types of lock. 5 first sectors of CD which have the code of area tha the CD can be runned to stop playing Japanese Titles into Europe market. The second one is about a series of areas which have be burned not correct (bad blocks). This can be done only with special CDRs which are aproved by Sony. Common CDRs cannot write bad blocks so Playstation can understand it and refuse to play the backup. Recently another protection came from Sony to prevent PSX Copies called: LibCrypt

- Libcrypt protection

LIBCRYPT sounds like a magical word for SONY ? or should I have said "sounded" :) since this protection is also bypassed thanks to CloneCD. As CloneCD author said: "..This is a nice "side effect" since CloneCD is originally designed for backing up PC CD.." This protection has been introduced in October 98 with the release of the game MediEvil , the protection uses a Digital ID which is stored in the SubChannel , it consists in a 16Bit key. Like SafeDisc protection, Libcrypt have have evolved in the time and there are currently 4 versions of LIBCRYPT called LC-1 , LC-2 , LC-3 ,LC-4: this one is in fact based on LC-3 scheme but includes extra routines and several ".exe" file , it makes the debugging work harder for the cracker, but for CloneCD: it is as easy as previous Libcrypt protections since this protection is always stored in the SubChannel Data and CloneCD copies everything it can find in the SubChannel Data :-)

How it works

As with any other type of protection, LibCrypt is composed of two separate routines: The first one performs a control check on the disk to discover if it is a copy, the second, based on the result of the first one, decrypts a block of data and crashes the PSX in the case of an incorrect result. Although based on the same code, the two routines have been altered a few times, to the point that in the last evolution (LC3) they have very little in common with the initial basic code.

How to recognize it

There's no official way , in fact you need to play the backup until you see the game crashes !

There is in fact a little alternative way: A nice tool has been made by Icarus/Paradox (with initial idea from AVH) in order to find the right key (used as a parameter for subroutines) faster, you need to put the LC-F CD (Libcrypt finder) in your Playstation, insert the original protected CD or cloned CD in the Playstation, then the 16Bit key appears on the screen in few seconds: all non protected game will always display this value : $1F0000045 ;therefore : every value different than the one mentioned will mean that the game is Libcrypt protected . Don't expect to find this tool over the net since it is only aimed to Paradox members, you can at least visit their website at www.paradogs.com :-)

Another useful info: Infogrames (video games editor) is known to be the firm who has officially bought Libcrypt License from Sony, therefore, since End of June 99 : 80% of games released by Infogrammes have been protected (e.g V-Rally 2 , Le Mans 24H , Eagle One Harrier Attack ...etc...Gekido)


17. Other Recources

Other Recources

Below are other sites about CD-Protection :

EmediaPro: Rallying the Disc Patrol: Protection Schemes for CD and DVD
Create your own CD Protection site
Empire's Copy Protection Page



Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2024 - All rights reserved -
Privacy policy - Contact Us .