Software Deletes Files to Defend Against Piracy 544
teamhasnoi writes "Back in 2004, we discussed a program that deleted your home directory on entry of a pirated serial number. Now, a new developer is using the same method to protect his software, aptly named Display Eater. In the developers's own words, 'There exist several illegal cd-keys that you can use to unlock the demo program. If Display Eater detects that you are using these, it will erase something. I don't know if this is going to become Display Eater policy. If this level of piracy continues, development will stop.'"
Aren't there laws against this? (Score:4, Insightful)
Re: (Score:2, Interesting)
Re:Aren't there laws against this? (Score:5, Insightful)
I don't think so. At the time the software "decides" to delete the user's files, it also "knows" that it is a pirated version, and that the serial number is invalid (that triggered the deletion). Hence, it also "knows" that it shouldn't allow itself to be unlocked from the demo version.
I think this is a very dangerous step: what if there was a bug that caused the software to delete your files without a pirated serial being entered?
Besides, if the author sells activation keys, he knows who bought which one, and thus whom to sue when one of those keys gets posted on warez sites. Unless he doesn't use online activation with arbitrary keys, but instead has an algorithm in his program that determines the validity of the key. That's just asking to be cracked.
Also, piracy tends to be a powerful weapon against your competition: you might not make money from the lost sale, but (1) your competitors won't either (2) the pirates gain familiarity with your software, and are more likely to choose it when placed in a situation where they can't use pirated software, or recommend it to friends, and your competitors don't gain this advantage. See also: Microsoft Windows/Office, Adobe Photoshop.
Re:Aren't there laws against this? (Score:5, Insightful)
I recall a day where I bought myself a copy of Quake III Arena, and the key the game came with was already in use and identified as a pirate key - thanks to keygens.
Makes me wonder how bulletproof this is.
Re: (Score:3, Interesting)
Re:Aren't there laws against this? (Score:5, Informative)
Re:Aren't there laws against this? (Score:5, Interesting)
Sure, he says that now, but which statement of his are we to believe? It doesn't look like the source code is available so the only way to test it is to install the program, find a pirated key, try it and see if you lose your home directory. I'd say it's far safer to just find another program and avoid this guy entirely.
Also note this:
Together these imply the deletion code was implemented and in the program prior to 2/7/2007. Based on the information available there's no way to tell how long it was in there, but it sounds like it was removed only on 2/7/2007.
So I don't think it was a hoax, I think the guy really did it, found out that it was the worst mistake he'd ever made and is now trying to do damage control. Personally I wouldn't use any program from him, at the least he lied about the code and has proven himself untrustworthy.
Re:Aren't there laws against this? (Score:4, Interesting)
It is a very dangerous step. The risk you mention is there, and so are others. It is a step so insidious, so tempting, that it could change the entire viability of being involved in the software industry, putting one member of the developer/user pair at extreme risk, even to the point of going out of business or losing things dear to them. It is thoughtless, cruel, and unethical, yet the benefit is so tempting that this same member is unlikely to be able to resist it without at least some soul-searching. The idea of getting something so useful accomplished for just a tiny bit of extra work — regardless of the consequences to the other party — is compelling indeed. So profound is the benefit, it may be that the mantle of social stigma one presumes would be associated with this type of activity will be assumed with pride, perhaps even hats and t-shirts bearing some type of cultural touchstone that signifies the wearer supports this will be produced. Yes, it displays a level of disregard that is no less than appalling to those of us who would like to think that the developer/user relationship would be one based on ethics that should be deeply ingrained into both parties; but we know these characteristics are widespread throughout not only one society, but the world's societies. Because we have seen all of this before.
In the software piracy community.
I suspect that developers in general have worked up just about the same regard for software pirates as the software pirates have displayed for them over the last few decades. That would be... none. So if this gets a foothold, it may be that the only thing that can stop it will be legislation. The only salient difference here is that developers tend to be easily found and prosecuted, as compared to pirates, and utterly toothless though congress and the states have proven to be with regard to protecting the developer's interests, I rather doubt they'll allow the developers to act as judge, jury and executioner in the matter of people who appropriate IP from them without providing the asking price.
So this is probably a tempest in a teapot. It'd be nice if it made the pirates think about what they are doing, but if there is one thing I am sure of, it is that software pirates don't do a lot of deep thinking. These are people with the behavior patterns of small, scheming children. Knowing they are unlikely to be caught, nothing remains to hold them back; they are truly ethical simpletons. I am sad to see developers falling to their level. But I am not surprised.
Re:Aren't there laws against this? (Score:4, Funny)
Re:Aren't there laws against this? (Score:5, Insightful)
Since when do software pirates hack into developers' systems and delete their stuff? Even in the rare cases like the famous HL2 hack at Valve, code was copied out not deleted.
Small, scheming children hoard everything for themselves, they don't share everything freely with the world. (Whether the things shared are "stolen" is a separate matter.) Developers like this one, with callous, selfish antipiracy measures are the only ones resembling children here.
I see you don't either, since your comparison is baseless and driven only by your obviously deep-seated visceral hate of pirates.
I make my living as a developer and I am not tempted to implement this measure in my software one iota. The fact that you do (and project your feelings onto others) is telling about how irrational and hateful you are in this matter.
Re:Aren't there laws against this? (Score:5, Insightful)
That is the only sane reason for any kind of copy protection. It must be done so as to make getting a free version more trouble than getting the legal paid version. You must put your paying customers on a pedestal above the pirates. If you treat them like criminals you may find them becoming more like them everyday.
I know several groups of software crackers and I understand the mentality behind them. They crack software because it's a challenge and there is some pride to be had. The last thing you want to do is piss them off or give them any room to think they are "doing the right thing". Yes piracy stings as a software developer but as long as you are making money it shouldn't sting enough for you to scorn your customers.
But go ahead make the customers into criminals and the pirates into heroes. Then when you have zero user base you'll finally realize where you went wrong.
Re: (Score:3, Insightful)
There are those whose means far exceed their demand for software and media, they would rather drop a couple hundred dollars on something than fuck around with serial sites in the first place. These people don't see any problem with copyright because it doesn't cause them any. There aren't very many of these people, but they do make all the laws.
There are those who cannot afford all the software and media they would like and would rather break the laws than do with
Re: (Score:3, Insightful)
First of all, it's ridiculous to think that EULAs are valid in the first place.
Second, and more importantly, disclaiming an accidental act is one thing, but disclaiming a malicious, intentional one is quite another. It would be quite a fucked up world if something like that were ruled legal, no matter what the circumstances!
Re: (Score:3, Informative)
In the UK, I believe this kind of thing falls foul of the Computer Misuse Act [opsi.gov.uk] - deleting the user's home directory in this example seems pretty well covered by the Act as being an offence.
Re:Aren't there laws against this? (Score:5, Insightful)
That is a very interesting point. I'd never thought of that before.
This developer should be ashamed of himself. Two wrongs don't make a right has been said. This is akin to taking a shotgun to someone stealing an apple. Absolutely reprehensible behaviour, and I hope he suffers dearly for this Russian Roulette style of copy protection.
And let's not forget... Typos... The developer may think "Oh yes, well the odds of someone typing a key wrong that happens to match the ones that trigger deletion is incredibly small..." To which I point to the 6/49 style lottery. Chances of winning, 16 million to one. People still win it though. Regularly.
Re:Aren't there laws against this? (Score:5, Insightful)
Okay, so if he's a MAJOR criminal, what does that make, to pick a name at random, Jeffrey Dahmer? I have no real sympathy for a pirate like that Australian one. He took a risk, got caught. But I DO have a major problem with your assertion that he's a MAJOR CRIMINAL. He's facing longer in jail than most rapists, or people responsible for manslaughter. If he'd broken into the office of the companies he copied software from, he'd be facing less time in jail.
So please, go ahead and explain how a womans body, or a human life, is worth less than some software.
I look forward to your justification of the term MAJOR CRIMINAL.
Re: (Score:3, Interesting)
Or better yet, don't run it at all -- and then see how much profit this asshole makes!
Re:Aren't there laws against this? (Score:5, Insightful)
I'm no rabid anti-copyrightist and I can understand the guy's frustration and desire to do something about piracy. However, his actions strike me as both ethically and legally dubious. Whether it's it's morally acceptable to damage someone's computer even if they pirate your software is one thing. Legality is another kettle of fish. There are issues as to whether he made the program's behaviour clear in the EULA, and even if he had whether this would make his actions acceptable.
Even if it were, this guy had better hope that his protection scheme doesn't go wrong and delete stuff when someone types in a key incorrectly (or types it in correctly and the program messes up anyway). We all know the BS some software goes through when it decides that what are supposedly legal keys are actually illegal; does anyone want to take that risk? What is his legal exposure if someone inadvertantly buys a copy with pirated keys from a dubious source?
Their responsibility? IANAL, but I wouldn't want to risk that line in a court of law.
He says that
Re:Aren't there laws against this? (Score:5, Informative)
Re:Aren't there laws against this? (Score:4, Interesting)
Patently false. Hitting you in the face is an intentional tort: battery. But sign a waiver, put on boxing gloves, and enter into a boxing ring with me, and you'd be completely without legal recourse when the fight begins. Consent, if properly expressed by contract, is a very effective defense to an intentional tort.
Now you might argue that there's no valid consent here, that the contract is ambiguous or non-binding for a number of reasons, but that's a different argument entirely.
Re:Aren't there laws against this? (Score:5, Insightful)
Competitive sports are a special class where generally all but intentional torts are waived. What you're missing here is that for there to be a tort, first there must be a duty to the aggrieved party (i.e., in general, I have a duty to not hit you). When you voluntarily step into the boxing ring for a match, there is no longer the duty not to hit your opponent. The nature of the sport is to hit him. In this case, society has expressed a policy in favor of allowing certain competitive sports, even where it conflicts with the policy of people not hitting each other.
In contrast, if you have an otherwise valid contract that says, "I am allowed to hit Bill Gates, and said Gates waives any recourse against me," and Bill himself signs the contract, and maybe you pay him a billion dollars for the privilege, you are still not privileged to hit Bill Gates at your whim. The contract is void as a matter of public policy because we have a strong public policy against people hitting each other, and there is no overriding policy that defeats it in this case. This is true of any intentional tort. If you can find a judge willing to hold that the policy of paying software vendors overrides our policy of not intentionally torting each other, I'm sure the BSA would like to speak to him.
And before anyone brings it up, yes, it's true that some morons in Congress once tossed around a law that said that the RIAA could destroy your computer if you downloaded music. They can get away with this because the statute, once passed, would trump the common law. So if you are rich enough to pay for a law, then you can have EULAs that allow you to destroy the user's home folder if he uses an invalid key. I doubt that this moron is.Re: (Score:3, Insightful)
Re:Aren't there laws against this? (Score:4, Interesting)
If I had purchased this software legitimately, and used the wrong key, I wonder what my recourses would be if it deleted my files.
Re: (Score:3, Funny)
Re:Aren't there laws against this? (Score:5, Interesting)
More specifically, deliberate destruction of another person' propety is not lawful even if they are in the act of committing a crime, whether or not the crime is against you or anyone else. For example, if you see a man run into a bank and the alarm bells start going off and you know he is robbing the bank, if you pull out your pocketknife and slash his tire to stop him from getting away, you will still be held liable for the damge to the tire.
Re:Aren't there laws against this? (Score:5, Informative)
It IS against the law: Computer Fraud and Abuse Act [wikipedia.org] - and the penalties were increased under the PATRIOT Act.
So, why not complain and get this guy marked as a "terr'rist"? After all, what's your pr0nn^Wdata worth?
Re: (Score:3, Informative)
You can't agree to "sign away" your statutory rights. Just like you can't "agree" to be a slave, or to sell your kids as sex toys to Michael Jackson, or to be an actor in a "snuff film."
Re:Aren't there laws against this? (Score:5, Funny)
I knew it was a good idea to read Slashdot one last time before leaving for work !
Vigilante justice (Score:5, Funny)
Re:Aren't there laws against this? (Score:4, Insightful)
I don't see how this would ever be prosecuted.
How would you prove that the deletion was malicious? He has carefully said the software will delete "something." Without knowing what, it is hard to prove anything. Stuff goes wrong with user's computers all the time. At one company I worked for we had a user blame a hard drive crash on our software. So a file gets deleted: prove it had anything to do with his software.
The complaint would start with, "I tried to run an illegal copy of this software..." That'll be creditable.
What if the software simply deletes itself? That would be the easiest and safest thing to do. Annoying to the would-be copyright violator, safe for the author.
Hope he likes prison (Score:5, Informative)
Re: (Score:2)
Fortunately, vnc2swf [unixuser.org] is free and easy to use.
Re:Hope he likes prison (Score:4, Interesting)
It is probably a criminal offense in the USA too, falling under the category of unauthorized access to a computer system. Based on the general advice that contract developers should not use software timebombs to insure payment, it is probably a civil offense too.
Furthermore, to the best of my knowledge, using someone else's serial number is not a crime - you can't copyright a serial number and the DMCA shouldn't apply to a valid serial# since it isn't an "access control circumvention device" any more than something like a car key is, and even if it was an invalid serial# certainly could not be one since it doesn't even work.
I think this guy is setting himself up for a whole host of problems if he pisses off the wrong guy.
Re:Hope he likes prison (Score:5, Interesting)
1. Purchase said application
2. Try to activate it using a pirated key because you have "misplaced" your real key
3. Sue the hell out of him
4. Get a microscopic slap on the wrist for the key thing
5. Get a massive damage award
6. Profit!
I can see so many ways to get the author in so much trouble over this. For example, send out SPAM advertising a 30-day free trial, using said serial number. He'll be drowning in criminal and civil lawsuits quicker than he can pull it from the market.
convinced me (Score:5, Funny)
Re: (Score:3, Informative)
iShowU [shinywhitebox.com] is my favorite video screen capture tool.
SnapZProX [ambrosiasw.com] is okay, but much too expensive. Its interface isn't as good as iShowU
I tried Display Eater a while ago, before this nonsense, and it wasn't very good. That's probably been a limiting factor in sales, which the developer interprets as piracy.
Re: (Score:3, Informative)
I remember in the previous discussion (linked in TFBlurb) the author of a particular program complained that he'd had several million downloads, but zero registrations. In his mind, all those millions of downloads were "piracy".
Well, I could have told him why no one registered his program: I'd long ago downloaded and tried it, but no way would I pay for it -- it's just not very good, in fact it's probably the most li
Re:convinced me (Score:4, Insightful)
Why would I care? The value of the program lies in what it does for me- if I thought it was worth $50 (or whatever), I'd buy it. If I didn't, I wouldn't buy it.
I'm not paying $50 so "nobody else can use this program for free". I'm paying $50 for whatever the software's functionality is.
You're speaking of schadenfreude at its worst.
As long as ... (Score:2)
But even if I were pirating your program, you have no right to damage my computer.
Also I don't run as a root.
And I back up my files.
Tom
Re: (Score:2)
Maybe not, but I'm willing to bet that whichever user you do run as has control over their own home directory, which is what this program wipes out...
Re: (Score:2)
The point of writing software is to solve a problem, the point of supporting it is to make money.
Tom
Re: (Score:2)
Scale of response (Score:2, Insightful)
Re: (Score:2)
he is equating piracy with destroying people's information.
Actually, I don't see where he said any of that. I think you're assuming his motives/thought-processes to be those of a self-justifying Slashdot user; but there's no indication of this.
It's just as likely that he doesn't give a toss about anyone that copies/steals his work, assumes they don't give a toss about him and (a) Wants to get his own back and harm them as much as possible, and (b) Discourage such behaviour in the future.
Re: (Score:2)
Don't get me wrong, I am NOT supporting piracy of software, music, or anything else. However, his -reaction- to software piracy by including the equivalent of a software bomb isn't justifiable in any way, shape, or form.
Disabling use of the software is easy, and would accomplish the exact
Re: (Score:2)
Could be. I have met numerous emotionally imbalanced individuals who would act in this manner. They care more getting their revenge against those who have committed imaginary slights than about progressing and growing in their own lives. In this case his revenge against people who weren't hurting him in any way (if anything an application gains a larger user base through piracy since those who
Re: (Score:2)
So you're saying that you don't think he cares about getting justice. You believe that he acting out of pure spite?
In his view, this probably *is* just; I'm saying that the projected self-justification given by the original poster isn't necessarily what he actually thought. If someone was vandalising my house, I might feel that it was just- or at least practical- to break the guy's f*****g arm. Whether this is actually right is another issue.
if anything an application gains a larger user base through piracy since those who pirate software aren't the people who would buy the program anyway
I'm not convinced that this is axiomatic.
No, development will stop as police take computers (Score:5, Funny)
Uh, no. Development will stop as the police collect your computers as evidence that you are the developer and distributor of software that intentionally erases files without user permission.
Do you suppose it really does delete things? (Score:3, Interesting)
It seems there would be too much liability to try and pull of a scheme like this
Re:Do you suppose it really does delete things? (Score:5, Informative)
Reading the linked discussion thread, this 'feature' was discovered when someone tried to pirate the software so they could review it against the product they were writing.
So... no, it's not an idle threat, and the author is a freaking asshole who deserves to have his reputation destroyed over this.
No, it isn't like that. (Score:5, Insightful)
Yes actually it is. (Score:3, Insightful)
Simple as that.
Lack of revenue != Loss of property; (Score:4, Insightful)
Simple as that.
You know what's a lot like theft, though? Having all data in your home folder taken away from you, permanently.
If you're looking for something tangible to liken to willfull disregard of copyright for personal use, try "sneaking in a movie theatre". THAT's the same: You're enjoying someone's hard work without giving them anything, but you aren't taking anything away from them.
If you catch people sneaking in your theatre, you can kick them out, you can hand them over to the proper authorities to be dealt with according to the law, but you cannot empty their pockets and trash their contents.
No matter how entitled you feel to your entry fee, you can't dish out vigilante justice.
Re:Do you suppose it really does delete things? (Score:5, Interesting)
Or maybe (hey, this is a crazy idea) the pirated key should just not unlock the program. Whoa! What a concept! That's so ingenious, I should go patent it.
Fact is, the program knows that the key is invalid and chooses to do something malicious rather than simply ceasing to function.
Re:Do you suppose it really does delete things? (Score:5, Insightful)
But since you like them so much, I'll point that it's in fact illegal in many places to booby trap your property. So if you have any great ideas, like turrets that automatically shoot at intruders, or connecting AC to the window frame, you will find that if a thief gets hit with any of that they can sue you -- and win.
In your case, there's a crime being committed: trespassing, and breaking and entering. But that in fact gives you no right whatsoever to make a mechanism that pours boiling pitch on the intruder. Your right to shoot trespassers in most place applies only to *self defense* if you personally are present. In some places you're not allowed to kill the intruder if they're not threatening you personally, and I'm pretty sure no place allows attacking an intruder by any sort of automatic means.
In this case, there's a crime being committed: copyright infringement. But that also doesn't give the author the right to take revenge by deleting files.
Hmm... lawsuits, anyone? (Score:2)
Clearly, piracy is not a contentious moral issue in the case of small software developers charging reasonable prices for their work, but this appears to be going too far. If one can detect the key's pirated and disable the software, why be an asshole about it? This could *so* come back and bite him in the ass.
Re: (Score:2)
This appears to be going to far in the same way that starting a war with Canada over their copyright laws appears to be too much.
This guy is an amoral jackass, If only there were some way we could delete his source code database to make sure he learns his lesson...
Re: (Score:2)
I agree-- if you want to screw with infringing users, just make sure that it's only your software and its inputs/outputs that you're screwing with. And if the user happens to save an anti-pir
Erase "something"? (Score:2)
You dont have the right to delete files due to a person mistyping some numbers. You do have the right to disable your software, nothing more.
The Pirates will still succeed (Score:2, Insightful)
To me, it seems that this protection scheme will only scare away the casual pirate and not the hardcore ones.
Vigilantism (Score:5, Insightful)
MOD PARENT UP, but (Score:3, Funny)
...on a side note, Bush has taken care of that [theonion.com].
;)
What a spoiled brat. (Score:5, Insightful)
It is a fully functional program WITHOUT registering, yet many people take the suggestion to register, and it pays for continued development.
If you're going to get your panties in a knot over some people using your software, you probably should be writing some software more innovative than a screen caputure utility. The world is already filled with those.
Thank you (Score:5, Interesting)
I will admit that I have way too much pirated software on my system at home. Of course, I'm also not using most of it. For the most part, I prefer to demo software I've never used - it's just too hard to get through the marketing hype to determine if it really works for me. I must have thirty or forty apps for video conversion. I use three. No, scratch that - I'm down to two now. One is freeware, and the other I registered.
Sadly, 15 day - and sometimes 30 day - trials just aren't enough. Because I'm busy, I may install something to try it, and then not really get to try it out fully for a couple of months. Which means I either get a cracked copy to try it, or I pass.
While I may not have all the software I own registered, I make sure to register those that really help - even those that don't require it. Since I'm not a programmer, I do rely on these "little" apps to help out. Rename1-4a, IrfanView, and a couple of others I find indespensible. I always make sure I pay for anything I'm still using after 6 months. If I 'm still using it, it's got to be good enough to pay for. Oddly, I still have some crakced versions I use becuase I'm too lazy to enter the real SNs. I have two or three versions of Nero floating around, not all of them with legitimate SNs, but I have three consecutive version retail registry numbers I paid for, so I'm calling it even.
Anyway, thanks for being generous. Some of us out here really appreciate it.
Re: (Score:3, Interesting)
Sadly, 15 day - and sometimes 30 day - trials just aren't enough.
I've been in that situation too. It shouldn't be that difficult to make the limit based on hours of use rather than date from install. It seems like that would be more fair. After all, if the app is just sitting there on my box, I'm not really using it. OTOH, if I've used it an hour a day on average for a month, then I've definitely become a user.
Needs an extra step to be okay. (Score:2)
If that is done, I see nothing wrong with it at all.
Re: (Score:2)
Most idiots hit OK without reading the dialog boxes during install. Might teach them TWO lessons!
I will never buy this now. (Score:2)
I know its meant to triggered by pirated keys only, but I wouldn't take the risk that this couldn't ever get triggered by some bug.
How to do this legally (Score:5, Funny)
Attention Users! Version 2099.0999 X of my software now comes with a special new feature! File deletion! To enable this great new feature, please find a pirated software key on the web and enter it. Any files that you have in "C:\Documents and Settings" will be deleted.
FAQ for possible problems using this great new feature:
I am sure that this developer... (Score:2)
High Opinion of Self, Low Opinion of Customers (Score:2)
Mac OSX (Score:3, Funny)
Well, that sure backfired (Score:5, Insightful)
Talk about a moronic idea -- if piracy was already a problem, the result of this will be much greater than the problems piracy ever created. And ironically enough, this will make pirating the product a safer proposition. Do you want to use a legal version, which has this file deleting "feature" that might one day go wrong and nuke something? O do you get the pirated version with the file deleting code removed from it?
This is a more extreme version of what happens with other sorts of copy prevention. There are games out there that run faster and more stable with the CD check disabled.
Re:Well, that sure backfired (Score:5, Funny)
Hmmm...he seems to have developed the ultimate form of copy protection. Maybe the **AAs will give him a medal or something.
Get a lawyer, buddy (Score:2)
This would be shaky legal ground for the developer if he damaged someone's computer. The courts tend to take a dim view of deliberate sabotage, regardless of the perceived merits.
There's a reason even the asshats at RIAA haven't gone this far.
Welcome to the software business. If you can't deal with the realities get into another line of work.
Sounds really stupid to me. (Score:2)
Why not just, say, phone home with any useful information (user name, IP address) available to the program every time it's run, and then he can sue?
Capabilities-based security (Score:2)
The existence of vigilante software like this is, in my mind, one of the strongest arguments for capabilities-based security. In traditional systems with ACL-based security (i.e., every popular PC operating system today), we really don't have a way to say "I trust this program to record video from my screen, but not to delete all of my documents." A properly-implemented capabilities system, on the other hand, could give us just that.
See http://www.eros-os.org/essays/capintro.html [eros-os.org] for a better introduction
Actually... it doesn't delete your home directory (Score:5, Informative)
The article and submission build on a misunderstanding. I conducted some research of my own and I've found that it does not attempt to delete the full home directory. It only deletes the ~/Library/Application Support/display_eater/ directory, i.e. files created by the trial version of the program. In fact, the developer says that the program will delete something from the home directory, but doesn't say what.
While I didn't acquire one of the pirated serial numbers that trigger the behavior, I have disassembled the program and these are my conclusions: The deletion is done by a function destroy() at offset 0xd148 that takes a single argument specifying the path to delete. destroy is called from a single location in the program:
+276 0000d3e4 3863a020 addi r3,r3,0xa020 ~/Library/Application Support/display_eater/ +280 0000d3e8 4bfffd39 bl _destroydestroy() loops over each thing contained by this directory and deletes it. I've invoked the function in this way, and it does not delete anything since that directory does not exist on my system.
So, while this anti-piracy tactic sure won't convince any potential pirates to actually pay for the software, it is not as egregious as the summary suggests.
It would be nice if someone would verify these conclusions, perhaps using a real pirated key.
Re: (Score:3, Informative)
Or, it could be that their home directory was actually deleted -- maybe they were us
Re:Actually... it doesn't delete your home directo (Score:4, Interesting)
I'd also be concerned that a mere typo (or the program misreading the input) while entering a legit serial number could trigger this.
I remember some years ago a particular DOS app would delete all files in the %TEMP% directory at exit. Trouble was, it assumed that all users were savvy enough to have moved the TEMP variable away from the default, which happened to be C:\DOS. So when the program was run, at exit it proceeded to delete the contents of the user's DOS directory. (At the time the coder reacted by saying users who didn't change their TEMP variable were too stupid to live anyway... how is that his determination to make? and if so, why didn't he take steps to protect even stupid users' data??)
Several times, I've had legit software refuse to accept its legit key, and had to go find one somewhere on the net to make it work. Not just small stuff either -- in one case, the app was Win98!!
Anyway, my point is... see how easy it is for the coder to make a mistake that could cost legit users bigtime?!
Inside the program ... (Score:5, Interesting)
Really, the whole thing looks like it was written by a goofy high-school kid. Since he is displaying the Apple Universal Binary logo on his site, I suspect he's in violation of the logo licence agreement, and I suspect Kagi, his payment processor, won't be too pleased with him, either.
Power Trip, Much? (Score:3, Insightful)
The sheer audacity of this guy's attitude over this problem is downright sickening. He's like one of those whiny little brats who'll only play a game until he starts losing, then trashes the game so no one else can cintinue playing.
If you're going to develop software, then you have to accept piracy as one of the negatives. (Though, personally, if a piece of software I wrote was being pirated, I'd be flattered knowing people wanted it bad enough to invest their time into doing so.) It's not like this guy never saw this coming (given he already keyed the software ahead of time), so why screw you're paying users over by threatening to cease development over it when it backfires? Besides, these "pirates" likely wouldn't bother using the software at all had the keying stuff been made unbreakable to begin with.
In the meanwhile, what happened to all this "trusted computing" junk that's supposed to "protect" us from stuff like this? Why aren't we sand-boxing all applications so that they only have basic read/write privileges, rather than having free reign over the system itself? Shouldn't we start looking into creating a centralized install/registration system where the OS itself handles the entire installation and approval/denial of software keys based on data the developers provide in the installation archive? That way, it is the OS itself that decides how to handle a pirated software key, rather than allowing individual developers to act as judge, jury and executioner without recourse. The developer in this article is exactly why we need such a system in place.
Video Flash Chat (Score:5, Interesting)
The softare was badly written (used register_globals, etc), and lots of the code was put in an eval() (potentially a security nightmare), and obfusicated (base64'd, etc). We decided to scrap it, rather than reverse engineer it, so we wrote our own.
Illegal in the UK (Score:3, Insightful)
The fact that the aggrieved party may have been committing a crime by using the software without authorisation does not alter anything. Two wrongs do not make a right. Deleting files from a user's home directory goes above and beyond reasonable force and is a criminal offence punishable by five years' imprisonment and/or a fine.
From the website.. (Score:3, Informative)
I hope the public will read this entire letter.
There has been alot of confusion regarding the copy protection of the program called Display Eater.
It is described here in:
There exists two illegal cd-keys that can be used to register the program without paying for it. When Display Eater detects these keys, it would delete your home directory.
However, this is not the case in reality. The whole purpose was to create a scare campaign. You can download, the file linked from the main page, which is now down(the link is still intact), and check it for yourself. It has http://reversecode.com/index.html [reversecode.com]
It was my hope that by creating a scare campaign, I could stop wasting time writing copy protection routines to be broken over and over. But, I was wrong, it backfired.
People started buying multiple keys, which I never intended, and in the beginning when the protection was in place, people who did not even know they had committed piracy or what piracy was were left in the dark. Legitimate users started fearing the program, which I never imagined.
A reporter called me today, and suggested that I make it free, and then have users pay for support. Or open source the program. I will consider all of these. -Reza
Malware (Score:3, Insightful)
Now he claims that this was only a 'scare campaign' and the program doesn't actually delete anything. What ever might be the truth, I still wouldn't trust this person.
I wouldn't dare to install anything from this guy, since there would be no way to know what kind of tantrum he was having when he was coding and what nasty suprises might come bundled with his software. Hiring this person would also be pretty risky. If he don't get high enough salary, he will plant a bomb in your companys software.
I doubt that this guy can blame piracy for the lack of money he gets from his software. I think that if you actually write good enough application you will also get paid. And if nobody buys your program, I think you should first look into mirror and at your product. Is it good enough, how many people would actually need this kind of program?
Or are there zillions of pirated copies of Display Eater around and this guy would be a millionaire if it wasn't for those nasty pirates?
Well, after this publicity, there won't be any kind of Display Eaters around. Hopefully. And perhaps this developer should be introduced with the law, just to make sure that he won't be coding any more malware in the future. We have enough of that allready.
Even if Microsoft and RIAA can get away with 'scare campaigns', you might not.
I will remember this name, Reza and keep far away from your 'products'.
Nice bit of error rate management.. (Score:3, Interesting)
This is a simple breach of virtually any computer related laws I can think of. If you have a problem with piracy you're welcome to stop the program from working - you have, however, no right to act as judge and jury and become a vigilante, nor do you have right of access to the computing resources and information your code is near.
In short, if you do that you're no better than a virus author and thus deserve the same treatment.
You can't even plead temporary insanity (well, OK, maybe permanent insanity
Re:very-bad-idea software (Score:4, Informative)
When I first read the link to the author's comments, I noticed that he doesn't actually say what will be deleted. So I was thinking maybe he deletes something that disables his own program - which wouldn't be that outrageous to me; it'd be a hassle to reinstall all the time and would discourage pirated use.
It's mentioned in the older Slashdot story, though, that he's deleting home directories. That's bad.
Also, we should note in the interests of factual correctness (something Slashdot doesn't demand) that he would delete only for cases where a pirated key was used. It doesn't say anything about incorrectly entered keys, just pirated ones. That's a little better, but I still think he's going way too far.
Re: (Score:2)
I also dont care what the EULA says, he cant even ask for the right to destroy your files.
There are limits.
Re: (Score:2)
He CANNOT deliberately do anything malicious or damaging to another's PC. As others have pointed out, it's illegal, to start with. And additionally, what he is doing IS immoral.
It's not an effective way of deterring pirates - it's a FAR more effective way of deterring anyone from ever using your software, period.
Re: (Score:2)
There's a reason why that's both illegal, and would get them sued in civil court -- it's ridiculous. People don't expect products to explode and kill them, nor do they expect software that performs one function, to magically transform itself int
Re: (Score:2)
I agree that THAT program is his but the files his program is deleting aren't. It would be more appropriate if the program deleted itself instead. In either event, this is a small time operation that depends on word of mouth to propagate and
Re: (Score:2)
Re: (Score:3, Insightful)
Here a several other possible scenarios. suppose an employee of the store, where the software had originally been purchased, had already secretly opened and installed the the software. He then had posted the key on the Internet several weeks before someone else purchased the software. A few stores even have their own shrink wrap machines that they use on returned hardware, so he might have shrink wrapped the software again before putting it back on the shelf.
Here is another alternative. Suppose some wo
Re: (Score:2)
Additionally, while I agree with the sentiment, some people prefer to review a product's full functionality before deciding to buy it. Apparently there is a 15 or 20 -MINUTE- trial period in which to examine and profile the application. There was discussion about this in another thread in the discussion area for this product (linked in the article), and how woefully inadequate it is.
At least give a full 24 or 48
Re: (Score:2)
Y'know, I'm just about done responding to your idiocy. You're doing a bang-up job showing just how much you DON'T know.
Re: (Score:2)
Re: (Score:2)
I agree. Despite the fact that I feel most anti-piracy measures are ineffective and counter productive, developers can add them if they wish. It's their software.
It is not, however, their computer.
I hope this developer gets sued for these antics. If I walk in to a Best Buy or something and shoplift, the store can insist I pay or call the police on me. However, if they chase me to my car, break my windshield and beat me up . . . well . . . guess who's getting the big settlement check out of that one.
Re: (Score:2)
It would seem more effective to figure out how to lock the pirate's computer down and extort them out of say, a thousand dollars, before returning complete control to them.
Legally risky. A less risky (but quite evil) scheme would be to let the user of a pirated piece of software think that it was working and use it for a while..... Just long enough to let them lock themselves in. Now they have a lot of data that only works with the pirated program and... Oh no! It doesn't work any more!
"I'm very sorry sir, it appears you're using an invalid or incorrect key. Yeah, it's okay, don't worry, probably just a minor typo when you were installing the program... if you enter the su
Re: (Score:3)