• More of my philosophy about the inside of VMProtect and more of my thou

    From World-News2100@21:1/5 to All on Fri Apr 1 00:04:06 2022
    Hello,


    More of my philosophy about the inside of VMProtect and more of my
    thoughts..

    I am a white arab from Morocco, and i think i am smart since i have also invented many scalable algorithms and algorithms..


    I think i am really smart and i have just read the following paper
    about VMProtect:

    https://www.mitchellzakocs.com/blog/vmprotect3


    And i think there is still a big weakness in VMProtect, and it is
    that it is difficult to prevent cracking the binary program, but
    i think that VMProtect just obfuscate the VM code, so it is
    a big problem, so i advise you to find a tool that obfuscate
    correctly the code, and i invite you to read the following study
    that permits you to understand more:

    https://www.diva-portal.org/smash/get/diva2:1127760/FULLTEXT02


    Read my previous thoughts:

    More of my philosophy about VMProtect and about reverse engineering and
    about obfuscation of the code and more of my thoughts..

    I think i am really smart and i am able to detect another pattern with
    my fluid intelligence and here it is:

    Look at how the software company called Ubisoft has only managed to
    protect Assassin’s Creed Origins from pirates for a month using also the
    best tool that is VMProtect:

    https://www.dsogaming.com/news/ubisoft-managed-protect-assassins-creed-origins-pirates-entire-month/

    So the other pattern is that Ubisoft has used the best tool that is
    VMProtect to prevent reverse engineering Assassin’s Creed Origins above,
    but i say that notice that the pirates have been able to reverse
    engineer the virtual machine of VMProtect even if it was obfuscated,
    since as i said below that a lot of VMs have two things in common:

    They are not complex (sometimes the bytecode instructions themselves are
    just decoded into x86 instructions - usually some VM instructions as
    well), and they are usually quite obfuscated.

    But i think that the VM of VMProtect was and is not so complex to
    understand how it decodes into x86 instructions, so then even if it was obfuscated in the Assassin’s Creed Origins, since the algorithms of the
    VM are not so complex to understand how they decode into x86
    instructions, so it was not so difficult for the pirates to reverse
    engineer and crack the VM and that was the easy path
    that allowed them to crack the software, this is why i say that the best
    way to prevent reverse engineering from understanding the code is to use difficult algorithms.

    Read my previous thoughts so that to understand more:

    More of my precision about more of my philosophy of how reverse
    engineering the code is so difficult to prevent..

    I think i am really smart, and i will make you notice the following
    pattern that i can detect with my fluid intelligence:

    Look at how the software company called Ubisoft has only managed to
    protect Assassin’s Creed Origins from pirates for a month using also the
    best tool that is VMProtect:

    https://www.dsogaming.com/news/ubisoft-managed-protect-assassins-creed-origins-pirates-entire-month/

    So i think that the weakness of reverse engineering from the above
    pattern, it is that it is easy for reverse engineering the code so that
    to "crack" the software , like they have done it for Assassin’s Creed Origins above, but it is so difficult for reverse engineering the code
    so that to understand the meaning of the difficult algorithms in the
    code, also i can logically infer that the second weakness of reverse engineering is that you can give the binary code that is cracked with
    reverse engineering, but with this kind of way of doing you have to be
    aware that the cracked binary code can contain a virus, this is why a "trusthworthy" relationship between a software developer or developers
    and the customers is so important. And it is my way of doing that is
    creating a trusthworthy relationship with my customers and with you here
    in those newsgroups forums and such, and read my previous thoughts so
    that to understand more my way of doing:


    I think that the best software for preventing reverse engineering the
    code is the following software that is called VMProtect:

    https://vmpsoft.com/


    But i think that one of the best protection against reverse engineering
    the code is also using virtual machines, but this way of doing has a
    weakness, since when a sample is protected with a VM, the only way to
    reverse engineer the code itself is to start with understanding the VM,
    but from what the experts know, a lot of VMs have two things in common:

    They are not complex (sometimes the bytecode instructions themselves are
    just decoded into x86 instructions - usually some VM instructions as
    well), and they are usually quite obfuscated, so you will need to
    reverse engineer the VM and understand how it is decoding bytecode
    instructions - and what each VM instruction does, and then you can use
    that knowledge to transform bytecode back into its original form - at
    which point you can analyze it in IDA Pro etc.. Usually, the not so
    difficult part for the experts in reverse engineering the code is
    understanding the VM despite obfuscation, so i think you can not be safe
    from reverse engineering the code, and so that to notice it, look in the following web link at how the software company called Ubisoft has only
    managed to protect Assassin’s Creed Origins from pirates for a month
    using also the best tool that is VMProtect:

    https://www.dsogaming.com/news/ubisoft-managed-protect-assassins-creed-origins-pirates-entire-month/

    And i think that China has a lot of experts in reverse engineering the
    code, so i think you can not be safe from reverse engineering the code
    in China.

    But here is my way of doing:

    More of my philosophy about copyrights and about patents and about
    reverse engineering and more..

    I am smart, and i will talk more about reverse engineering, so i think
    that the creative ways to break disassemblers or debuggers or by using
    source code Obfuscation or by virtual machines... are not so efficient
    against reverse engineering, so i will give you my smart way of doing
    it, first as i have just told you, that you have to protect your
    value-added of your code that you want to sell by for example using more difficult or difficult algorithms in a smart way that are more difficult
    or difficult to understand with assembler code from machine code, and
    after that you have to use copyright in a smart way, for example i will
    use like the following service from a company in Canada that provides a copyright filled and certified by a public notary that is valid for 172 countries, you can read about it here:

    http://en.scopyright.ca/

    But you have to be smart, since the "patent" that protects an algorithm
    is not valid in so many countries such as India etc., so the best way is
    to use a copyright as i am doing it, so that this kind of copyright
    allows you to fill a lawsuit against binary code that is stolen from you
    by asking the one that has stolen from you to show his source code in
    a legal lawsuit.


    Thank you,
    Amine Moulay Ramdane.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)