Hello,
Read again, i correct about more of my philosophy about VMProtect and
about reverse engineering and about obfuscation of the code and more of
my thoughts..
I am a white arab from Morocco, and i think i am smart since i have also invented many scalable algorithms and algorithms..
I think i am really smart and i am able to detect another pattern with
my fluid intelligence and here it is:
Look at how the software company called Ubisoft has only managed to
protect Assassin’s Creed Origins from pirates for a month using also the
best tool that is VMProtect:
https://www.dsogaming.com/news/ubisoft-managed-protect-assassins-creed-origins-pirates-entire-month/
So the other pattern is that Ubisoft has used the best tool that is
VMProtect to prevent reverse engineering Assassin’s Creed Origins above,
but i say that notice that the pirates have been able to reverse
engineer the virtual machine of VMProtect even if it was obfuscated,
since as i said below that a lot of VMs have two things in common:
They are not complex (sometimes the bytecode instructions themselves are
just decoded into x86 instructions - usually some VM instructions as
well), and they are usually quite obfuscated.
But i think that the VM of VMProtect was and is not so complex to
understand how it decodes into x86 instructions, so then even if it was obfuscated in the Assassin’s Creed Origins, since the algorithms of the
VM are not so complex to understand how they decode into x86
instructions, so it was not so difficult for the pirates to reverse
engineer and crack the VM and that was the easy path
that allowed them to crack the software, this is why i say that the best
way to prevent reverse engineering from understanding the code is to use difficult algorithms.
Read my previous thoughts so that to understand more:
More of my precision about more of my philosophy of how reverse
engineering the code is so difficult to prevent..
I think i am really smart, and i will make you notice the following
pattern that i can detect with my fluid intelligence:
Look at how the software company called Ubisoft has only managed to
protect Assassin’s Creed Origins from pirates for a month using also the
best tool that is VMProtect:
https://www.dsogaming.com/news/ubisoft-managed-protect-assassins-creed-origins-pirates-entire-month/
So i think that the weakness of reverse engineering from the above
pattern, it is that it is easy for reverse engineering the code so that
to "crack" the software , like they have done it for Assassin’s Creed Origins above, but it is so difficult for reverse engineering the code
so that to understand the meaning of the difficult algorithms in the
code, also i can logically infer that the second weakness of reverse engineering is that you can give the binary code that is cracked with
reverse engineering, but with this kind of way of doing you have to be
aware that the cracked binary code can contain a virus, this is why a "trusthworthy" relationship between a software developer or developers
and the customers is so important. And it is my way of doing that is
creating a trusthworthy relationship with my customers and with you here
in those newsgroups forums and such, and read my previous thoughts so
that to understand more my way of doing:
I think that the best software for preventing reverse engineering the
code is the following software that is called VMProtect:
https://vmpsoft.com/
But i think that one of the best protection against reverse engineering
the code is also using virtual machines, but this way of doing has a
weakness, since when a sample is protected with a VM, the only way to
reverse engineer the code itself is to start with understanding the VM,
but from what the experts know, a lot of VMs have two things in common:
They are not complex (sometimes the bytecode instructions themselves are
just decoded into x86 instructions - usually some VM instructions as
well), and they are usually quite obfuscated, so you will need to
reverse engineer the VM and understand how it is decoding bytecode
instructions - and what each VM instruction does, and then you can use
that knowledge to transform bytecode back into its original form - at
which point you can analyze it in IDA Pro etc.. Usually, the not so
difficult part for the experts in reverse engineering the code is
understanding the VM despite obfuscation, so i think you can not be safe
from reverse engineering the code, and so that to notice it, look in the following web link at how the software company called Ubisoft has only
managed to protect Assassin’s Creed Origins from pirates for a month
using also the best tool that is VMProtect:
https://www.dsogaming.com/news/ubisoft-managed-protect-assassins-creed-origins-pirates-entire-month/
And i think that China has a lot of experts in reverse engineering the
code, so i think you can not be safe from reverse engineering the code
in China.
But here is my way of doing:
More of my philosophy about copyrights and about patents and about
reverse engineering and more..
I am smart, and i will talk more about reverse engineering, so i think
that the creative ways to break disassemblers or debuggers or by using
source code Obfuscation or by virtual machines... are not so efficient
against reverse engineering, so i will give you my smart way of doing
it, first as i have just told you, that you have to protect your
value-added of your code that you want to sell by for example using more difficult or difficult algorithms in a smart way that are more difficult
or difficult to understand with assembler code from machine code, and
after that you have to use copyright in a smart way, for example i will
use like the following service from a company in Canada that provides a copyright filled and certified by a public notary that is valid for 172 countries, you can read about it here:
http://en.scopyright.ca/
But you have to be smart, since the "patent" that protects an algorithm
is not valid in so many countries such as India etc., so the best way is
to use a copyright as i am doing it, so that this kind of copyright
allows you to fill a lawsuit against binary code that is stolen from you
by asking the one that has stolen from you to show his source code in
a legal lawsuit.
Thank you,
Amine Moulay Ramdane.
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)