Rocksolid Light

Welcome to RetroBBS

mail  files  register  newsreader  groups  login

Message-ID:  

One man's constant is another man's variable. -- A. J. Perlis


devel / comp.programming.threads / Read again, i correct about more of my philosophy about VMProtect and about reverse engineering and about obfuscation of the code and more of my thoughts..

SubjectAuthor
o Read again, i correct about more of my philosophy about VMProtect andAmine Moulay Ramdane

1
Read again, i correct about more of my philosophy about VMProtect and about reverse engineering and about obfuscation of the code and more of my thoughts..

<526a6604-8dbe-4b63-84d4-c955ac349defn@googlegroups.com>

  copy mid

https://www.rocksolidbbs.com/devel/article-flat.php?id=662&group=comp.programming.threads#662

  copy link   Newsgroups: comp.programming.threads
X-Received: by 2002:ac8:5883:0:b0:2e1:c6f9:a12f with SMTP id t3-20020ac85883000000b002e1c6f9a12fmr6947668qta.439.1648782005035;
Thu, 31 Mar 2022 20:00:05 -0700 (PDT)
X-Received: by 2002:a37:b1c7:0:b0:67d:6a17:cdcf with SMTP id
a190-20020a37b1c7000000b0067d6a17cdcfmr5275807qkf.402.1648782004800; Thu, 31
Mar 2022 20:00:04 -0700 (PDT)
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!border2.nntp.dca1.giganews.com!nntp.giganews.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.programming.threads
Date: Thu, 31 Mar 2022 20:00:04 -0700 (PDT)
Injection-Info: google-groups.googlegroups.com; posting-host=173.178.84.155; posting-account=R-6XjwoAAACnHXTO3L-lyPW6wRsSmYW9
NNTP-Posting-Host: 173.178.84.155
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <526a6604-8dbe-4b63-84d4-c955ac349defn@googlegroups.com>
Subject: Read again, i correct about more of my philosophy about VMProtect and
about reverse engineering and about obfuscation of the code and more of my thoughts..
From: aminer68@gmail.com (Amine Moulay Ramdane)
Injection-Date: Fri, 01 Apr 2022 03:00:05 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Lines: 135
 by: Amine Moulay Ramdane - Fri, 1 Apr 2022 03:00 UTC

Hello,

Read again, i correct about more of my philosophy about VMProtect and about reverse engineering and about obfuscation of the code and more of my thoughts..

I am a white arab from Morocco, and i think i am smart since i have also
invented many scalable algorithms and algorithms..

I think i am really smart and i am able to detect another pattern with
my fluid intelligence and here it is:

Look at how the software company called Ubisoft has only managed to protect Assassin’s Creed Origins from pirates for a month using also the best tool that is VMProtect:

https://www.dsogaming.com/news/ubisoft-managed-protect-assassins-creed-origins-pirates-entire-month/

So the other pattern is that Ubisoft has used the best tool that is VMProtect to prevent reverse engineering Assassin’s Creed Origins above, but i say that notice that the pirates have been able to reverse engineer the virtual machine of VMProtect even if it was obfuscated, since as i said below that a lot of VMs have two things in common:

They are not complex (sometimes the bytecode instructions themselves are just decoded into x86 instructions - usually some VM instructions as well), and they are usually quite obfuscated.

But i think that the VM of VMProtect was and is not so complex to understand how it decodes into x86 instructions, so then even if it was obfuscated in the Assassin’s Creed Origins, since the algorithms of the VM are not so complex to understand how they decode into x86 instructions, so it was not so difficult for the pirates to reverse engineer and crack the VM and that was the easy path
that allowed them to crack the software, this is why i say that the best way to prevent reverse engineering from understanding the code is to use difficult algorithms.

Read my previous thoughts so that to understand more:

More of my precision about more of my philosophy of how reverse engineering the code is so difficult to prevent..

I think i am really smart, and i will make you notice the following pattern that i can detect with my fluid intelligence:

Look at how the software company called Ubisoft has only managed to protect Assassin’s Creed Origins from pirates for a month using also the best tool that is VMProtect:

https://www.dsogaming.com/news/ubisoft-managed-protect-assassins-creed-origins-pirates-entire-month/

So i think that the weakness of reverse engineering from the above pattern, it is that it is easy for reverse engineering the code so that to "crack" the software , like they have done it for Assassin’s Creed Origins above, but it is so difficult for reverse engineering the code so that to understand the meaning of the difficult algorithms in the code, also i can logically infer that the second weakness of reverse engineering is that you can give the binary code that is cracked with reverse engineering, but with this kind of way of doing you have to be aware that the cracked binary code can contain a virus, this is why a "trusthworthy" relationship between a software developer or developers and the customers is so important. And it is my way of doing that is creating a trusthworthy relationship with my customers and with you here in those newsgroups forums and such, and read my previous thoughts so that to understand more my way of doing:

I think that the best software for preventing reverse engineering the code is the following software that is called VMProtect:

https://vmpsoft.com/

But i think that one of the best protection against reverse engineering the code is also using virtual machines, but this way of doing has a weakness, since when a sample is protected with a VM, the only way to reverse engineer the code itself is to start with understanding the VM, but from what the experts know, a lot of VMs have two things in common:

They are not complex (sometimes the bytecode instructions themselves are just decoded into x86 instructions - usually some VM instructions as well), and they are usually quite obfuscated, so you will need to reverse engineer the VM and understand how it is decoding bytecode instructions - and what each VM instruction does, and then you can use that knowledge to transform bytecode back into its original form - at which point you can analyze it in IDA Pro etc.. Usually, the not so difficult part for the experts in reverse engineering the code is understanding the VM despite obfuscation, so i think you can not be safe from reverse engineering the code, and so that to notice it, look in the following web link at how the software company called Ubisoft has only managed to protect Assassin’s Creed Origins from pirates for a month using also the best tool that is VMProtect:

https://www.dsogaming.com/news/ubisoft-managed-protect-assassins-creed-origins-pirates-entire-month/

And i think that China has a lot of experts in reverse engineering the code, so i think you can not be safe from reverse engineering the code in China..

But here is my way of doing:

More of my philosophy about copyrights and about patents and about
reverse engineering and more..

I am smart, and i will talk more about reverse engineering, so i think that the creative ways to break disassemblers or debuggers or by using source code Obfuscation or by virtual machines... are not so efficient against reverse engineering, so i will give you my smart way of doing it, first as i have just told you, that you have to protect your value-added of your code that you want to sell by for example using more difficult or difficult algorithms in a smart way that are more difficult or difficult to understand with assembler code from machine code, and after that you have to use copyright in a smart way, for example i will use like the following service from a company in Canada that provides a copyright filled and certified by a public notary that is valid for 172 countries, you can read about it here:

http://en.scopyright.ca/

But you have to be smart, since the "patent" that protects an algorithm is not valid in so many countries such as India etc., so the best way is to use a copyright as i am doing it, so that this kind of copyright allows you to fill a lawsuit against binary code that is stolen from you by asking the one that has stolen from you to show his source code in
a legal lawsuit.

Thank you,
Amine Moulay Ramdane.


devel / comp.programming.threads / Read again, i correct about more of my philosophy about VMProtect and about reverse engineering and about obfuscation of the code and more of my thoughts..

1
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor