With over 20 years in this business, we have lost track of how many times someone has come to us to say, “I have an amazing software product and I want to make sure it can’t be hacked or copied… EVER!”
Throughout the industry we’re known for our amazing customer support and, as an extension of our reputation, we believe we are obligated to candidly respond to such declarations with these 5 blatant truths:
In an anonymous and admittedly unscientific poll that we recently initiated through our newsletter, over 50% of the respondents admitted to “bending” software licenses. That likely means that roughly half the readers of this post have probably done it, too. What we do know for certain is that a gentle reminder to customers quite often prompts a legitimate purchase, thereby increasing revenues.
You don’t want your software stacked on a table next to potato chips and candy bars alongside a padlocked box bearing a “Pay Here” sign. Yet, a bank vault behind six feet of concrete and steel — and guarded by armed security — is overkill. Now, doesn’t a vending machine sound right for your security needs and budget?
Imagine seeing your software as you peer through the glass pane of a vending machine. Sure, someone can break the glass, shake the machine, or finagle their arms up through the delivery chute if they’re so inclined, but there is enough of a barrier to thwart temptation for most. When this degree of protection is applied to software piracy, it allows the interaction between the software provider and the end-user to remain automated, safe, and unencumbered. Remember, as technology evolves, better reinforcements can be made to the vending machine (code design), further mitigating potential theft through machine-shaking, glass-smashing, and the use of rubbery arms.
You want to find the solution that strikes the balance of easy implementation and the right amount of licensing control, flexibility and cost-effectiveness for your specific needs. SoftwareKey System customers enjoy tremendous value because our automated licensing system doesn’t require them to spend too much time or resources to achieve their goals. They get exactly what they need, including some peace of mind.
Related blog post: Validate Your Decision to Use a Licensing System
If the human mind can engineer a copy-protection mechanism, then a human mind can also reverse-engineer the same system, given enough time and effort. The largest technology companies invest vast amounts on anti-piracy measures but have yet to totally eliminate it. It’s shocking but true that a simple Google search will turn up information on big-name product key structures and free versions of all of their software products as well.
Consider the progression of protection mechanisms used to protect commercial DVDs and Blu-ray discs, a huge industry which finds itself still vulnerable to hacking. Hackers quickly broke the encryption used to copy-protect DVDs; in response, the Blu-ray consortium engaged senior engineers to come up with a new encryption standard for the Blu-ray disc format. Even though this newer encryption algorithm is much more sophisticated, all a hacker needed to do was compromise one “master key” — and now there are dozens of software tools available to break the encryption of Blu-ray discs!
We recently ran across a really good Ars Technica article entitled, “Can software be protected from piracy?” that drives the above point home. Here are a few notable quotes from the article:
“Code is data. When the code is runnable, a copy of that data is unprotected code. Unprotected code can be copied.” — Tim Williscroft
“Ultimately the big problem [with running software in an untrusted environment such as on customer-owned equipment] is that most software involves handing both the lock and the key to the potential attacker and hoping they don’t figure out how to put them together.”
There are a myriad of risks and consequences associated with downloading pirated copies of software, but that’s a subject for another day — and another blog post! Modified cracked copies can function as a Trojan and that’s just the start of the ensuing misery. The FBI has even issued a consumer alert warning regarding embedded malware within pirated software.
Before you leave this page hating on hackers the world over, chew on this alternative perspective: This interesting TED talk offers a look through the lens of one leading cybersecurity expert’s appreciation for hackers and the “good” that some of them actually contribute.
Mike Wozniak is one of the co-founders of SoftwareKey.com and responsible for marketing, content and product strategy. When he isn't plotting new ways to help customers solve licensing and business automation challenges, he likes to travel and entertain guests who come to visit the Orlando area. He also writes most of the licensing tips here.
What is Cloud-Controlled Network Floating Licensing?
Why Software Licensing is a Smart Move
What you need to know about distributing and updating licensed software
Licensing for non-visual software and services
How to Protect a Web Application with Licensing Controls
7 Ways License Automation Increases Revenue and Saves Time