• More of my philosophy about the inside of VMProtect and more of my thou

    From Amine Moulay Ramdane@21:1/5 to All on Thu Mar 31 21:06:51 2022
    Hello,


    More of my philosophy about the inside of VMProtect and more of my thoughts..

    I am a white arab from Morocco, and i think i am smart since i have also invented many scalable algorithms and algorithms..


    I think i am really smart and i have just read the following paper
    about VMProtect:

    https://www.mitchellzakocs.com/blog/vmprotect3


    And i think there is still a big weakness in VMProtect, and it is
    that it is difficult to prevent cracking the binary program, but
    i think that VMProtect just obfuscate the VM code, so it is
    a big problem, so i advise you to find a tool that obfuscate
    correctly the code, and i invite you to read the following study
    that permits you to understand more:

    https://www.diva-portal.org/smash/get/diva2:1127760/FULLTEXT02


    Read my previous thoughts:

    More of my philosophy about VMProtect and about reverse engineering and about obfuscation of the code and more of my thoughts..

    I think i am really smart and i am able to detect another pattern with
    my fluid intelligence and here it is:

    Look at how the software company called Ubisoft has only managed to protect Assassin’s Creed Origins from pirates for a month using also the best tool that is VMProtect:

    https://www.dsogaming.com/news/ubisoft-managed-protect-assassins-creed-origins-pirates-entire-month/

    So the other pattern is that Ubisoft has used the best tool that is VMProtect to prevent reverse engineering Assassin’s Creed Origins above, but i say that notice that the pirates have been able to reverse engineer the virtual machine of VMProtect even
    if it was obfuscated, since as i said below that a lot of VMs have two things in common:

    They are not complex (sometimes the bytecode instructions themselves are just decoded into x86 instructions - usually some VM instructions as well), and they are usually quite obfuscated.

    But i think that the VM of VMProtect was and is not so complex to understand how it decodes into x86 instructions, so then even if it was obfuscated in the Assassin’s Creed Origins, since the algorithms of the VM are not so complex to understand how
    they decode into x86 instructions, so it was not so difficult for the pirates to reverse engineer and crack the VM and that was the easy path
    that allowed them to crack the software, this is why i say that the best way to prevent reverse engineering from understanding the code is to use difficult algorithms.

    Read my previous thoughts so that to understand more:

    More of my precision about more of my philosophy of how reverse engineering the code is so difficult to prevent..

    I think i am really smart, and i will make you notice the following pattern that i can detect with my fluid intelligence:

    Look at how the software company called Ubisoft has only managed to protect Assassin’s Creed Origins from pirates for a month using also the best tool that is VMProtect:

    https://www.dsogaming.com/news/ubisoft-managed-protect-assassins-creed-origins-pirates-entire-month/

    So i think that the weakness of reverse engineering from the above pattern, it is that it is easy for reverse engineering the code so that to "crack" the software , like they have done it for Assassin’s Creed Origins above, but it is so difficult for
    reverse engineering the code so that to understand the meaning of the difficult algorithms in the code, also i can logically infer that the second weakness of reverse engineering is that you can give the binary code that is cracked with reverse
    engineering, but with this kind of way of doing you have to be aware that the cracked binary code can contain a virus, this is why a "trusthworthy" relationship between a software developer or developers and the customers is so important. And it is my
    way of doing that is creating a trusthworthy relationship with my customers and with you here in those newsgroups forums and such, and read my previous thoughts so that to understand more my way of doing:


    I think that the best software for preventing reverse engineering the code is the following software that is called VMProtect:

    https://vmpsoft.com/


    But i think that one of the best protection against reverse engineering the code is also using virtual machines, but this way of doing has a weakness, since when a sample is protected with a VM, the only way to reverse engineer the code itself is to
    start with understanding the VM, but from what the experts know, a lot of VMs have two things in common:

    They are not complex (sometimes the bytecode instructions themselves are just decoded into x86 instructions - usually some VM instructions as well), and they are usually quite obfuscated, so you will need to reverse engineer the VM and understand how it
    is decoding bytecode instructions - and what each VM instruction does, and then you can use that knowledge to transform bytecode back into its original form - at which point you can analyze it in IDA Pro etc.. Usually, the not so difficult part for the
    experts in reverse engineering the code is understanding the VM despite obfuscation, so i think you can not be safe from reverse engineering the code, and so that to notice it, look in the following web link at how the software company called Ubisoft has
    only managed to protect Assassin’s Creed Origins from pirates for a month using also the best tool that is VMProtect:

    https://www.dsogaming.com/news/ubisoft-managed-protect-assassins-creed-origins-pirates-entire-month/

    And i think that China has a lot of experts in reverse engineering the code, so i think you can not be safe from reverse engineering the code in China.

    But here is my way of doing:

    More of my philosophy about copyrights and about patents and about
    reverse engineering and more..

    I am smart, and i will talk more about reverse engineering, so i think that the creative ways to break disassemblers or debuggers or by using source code Obfuscation or by virtual machines... are not so efficient against reverse engineering, so i will
    give you my smart way of doing it, first as i have just told you, that you have to protect your value-added of your code that you want to sell by for example using more difficult or difficult algorithms in a smart way that are more difficult or difficult
    to understand with assembler code from machine code, and after that you have to use copyright in a smart way, for example i will use like the following service from a company in Canada that provides a copyright filled and certified by a public notary
    that is valid for 172 countries, you can read about it here:

    http://en.scopyright.ca/

    But you have to be smart, since the "patent" that protects an algorithm is not valid in so many countries such as India etc., so the best way is to use a copyright as i am doing it, so that this kind of copyright allows you to fill a lawsuit against
    binary code that is stolen from you by asking the one that has stolen from you to show his source code in
    a legal lawsuit.


    Thank you,
    Amine Moulay Ramdane.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From First name Last name@21:1/5 to All on Sat May 14 02:29:44 2022
    You calling me already ?


    *********************
    The king of kings in this world

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)