Installer Steam
connexion
|
langue
简体中文 (chinois simplifié)
繁體中文 (chinois traditionnel)
日本語 (japonais)
한국어 (coréen)
ไทย (thaï)
Български (bulgare)
Čeština (tchèque)
Dansk (danois)
Deutsch (allemand)
English (anglais)
Español - España (espagnol castillan)
Español - Latinoamérica (espagnol d'Amérique latine)
Ελληνικά (grec)
Italiano (italien)
Bahasa Indonesia (indonésien)
Magyar (hongrois)
Nederlands (néerlandais)
Norsk (norvégien)
Polski (polonais)
Português (portugais du Portugal)
Português - Brasil (portugais du Brésil)
Română (roumain)
Русский (russe)
Suomi (finnois)
Svenska (suédois)
Türkçe (turc)
Tiếng Việt (vietnamien)
Українська (ukrainien)
Signaler un problème de traduction
If that was the case, the game wouldn't work. Denuvo needs to check in every so often, but it doesn't do it that often. Let it do it's thing, it pretty much keeps to itself.
Oh yes, the infamous Starforce filter driver for optical drives.
A driver that was installed on all optical drives without ever asking for permission and which caused havoc with many of them. Vendor-specific driver components no longer operating within tolerance values or operating correctly at all, disc-burning capabilities being compromised, etc.
Moreover, the way Starforce worked was that the filter driver was designed specifically to bypass all sanity and security checks in your optical drive's own driver, by falling back on a (not always correctly supported) lower level API to force the drive to read certain disc sectors that resided in an area of the disc that had its topology intentionally compromised to not be correctly readable. It would then match what it got back to a predetermined set of partially read 'malformed' data and would give you the all clear if you passed the check.
Howeer, most optical drives, when failing to read a disc's topology like that a few times, would enter a special mode where they would recalibrate the drive's laser system. This is rather sane, because as a drive ages it can experience minor drift and need to be reseated.
Ofcourse, consumer grade drives were only ever rated to perform that kind of operation a few times over the effective lifespan of the drive. And not continuously as normal operating procedure, the way Starforce forced it to operate.
And thus, you'd get drives that would be physically worn down and wrecked within the span of a year, instead of the normal 10 to 20 years they were supposed to last.
Denuvo doesn't actually do anything near as malicious as that.
Also; Starforce's driver was, iirc, sensitive to several permission elevation exploits that could let user-mode code run in kernel-mode. So uh; you might want to rethink the point you're raising regarding "possibility of abusive black market".
There's a big, big difference between decrypting the entire executable and running that natively, and running encrypted code via a special virtual machine which decrypts only small portions of the code as it runs through it and immediately tosses them away.
The latter is what protection schemes such as Denuvo do and Denuvo is actually one of the better behaved ones with regards to security, exploitability by malware and disk writes.
True. Within several member states of the EU a "boxed" stock digital purchase such as the games distributed on Steam are actually treated by law as a good. And that means it gets all the benefits of warranty and fitness for purpose.
Doesn't matter. They're selling their product via the Steam storefront for the EU, which means they are consciously targeting the EU as a market. And that means they must abide by EU law.
Actually; the EU has a good deal more protection than just that. Even if a company would only target a single member state, according to EU law that would still mean they are targeting all member states. (This protects the idea of the internal unified market.) And if any consumer purchases their product, said purchase and all legal matters surrounding it are dictated to fall under the local laws of the member state where said consumer resides.
I.e. if they attempt to sell this in France, a purchase by a resident of Germany will fall under German law.
As for StarForce... that's a special breed of awful. Your hard drive itself took some serious wear, and the rootkit-like behavior of StarForce could go as far as to corrupt your OS. But hey, at least it took a year to crack Splinter Cell 3!
So you actually know how small those portions of the code are? You don't even know raw numbers data amounts Denuvo uses. Nobody here seem to realize how huge those numbers should be for any particular game to remain uncracked.
Tell me about it, try to compare it with any other DRM under these 3 effects. As soon as you understand how it works, you'll realize how useless these arguments are.
You opened this discussion when you brought StarForce's filter driver into the equation, which is only installed for implementations of StarForce that handle physical media.
And just what do you mean with "abusive black market" if you're not referring to the potential to be exploited by malware?
And you do know?
Anyway; those chunks of code could easily go as small as the method level. That's actually how modern programming languages like C# have their runtime environment work; compiling a method's bytecode before first access and then hookin the compiled version of the code into place by swapping out a few pointer references. It's a large part of how the optimizing compilers in modern JavaScript engines work as well.
Really, depending on what Denuvo's VM is actually doing, the parts of code that at any one time exist in decrypted form in memory may be many times smaller. Maybe even a few CPU instructions at a time.
(And yes; if you combine that with scrambling the code with many jumps and clever redirection tricks, it would definitely make it impossible or atleast really, really hard for anyone to use decompilation or debugging tools and get a beat on the total picture of what the code is actually doing.)
There's atleast one bit of anti-tamperware which is much worse than Denuvo.
It continuously writes small DLLs to the current user's temporary files folder from which it pick them up and executes them. Many times it has issues when run without full administrative permissions granted via UAC.
This means you have to open up administrative permissions to this anti-tamperware. It also means that any malware can trigger a race condition and inject its own malicious payload into the DLLs that reside in the user account temp folder (since writing there does not require administrative permissions) and get that payload to run with full administrative permissions, achieving privilige escalation.
Said anti-tamperware is also permanently (as in; explicitly notified that it will not be removed) on the blacklist of several anti-virus vendors, since it is known to circulate on the black market as a means to mask malware payloads from anti-virus protection.
It used to protect the PC/Steam port of Tales of Symphonia and was actually removed after a lot of backlash. I'll leave it to you to look up the name.
Again - I can't exactly describe this because it's against Steam forum rules. Find serious discussions elsewhere and you'll see.
Either your knowledge about reverse engineering is limited to ~10 years old methods and tools or you don't care. The smaller chucks of code you protect, the easier for crackers to solve it. Those who think that Denuvo is doing so little are being deceived by their marketing and transparency strategy (the absense of it).
Are you sure? I don't see why something would need to load and execute continously-written DLL files. I'd say if they were indeed continously written, they might not be library files that you could load in memory.
When you approve any application through UAC, it gets permision to load any accessible library. It doesn't matter under which account the DLL files were written into the TEMP folder. It only matters when approved application gets access to them. Which means you'd still need to manually approve some virus application before it could load some modified DLL from the TEMP folder.
And I'm pretty sure the DRM has protection against loading modified DLL files if it creates them by itself.
That's not a black market. There is no money involved in distributing cracked copies of DRM suites.
How about you choose a better example of DRM, like some that was massively used on games? I only know literally about just 2 somewhat representative games with VMProtect. The fact that it was bad doesn't make Denuvo any better than any other DRM.
Its a bit of a split issue. Starforce was nasty, and i can understand if people are against drm based off that. But yes, there will be people out there claiming that all data should be free, but also want to be paid for the work that *they* do.
I'm a software developer, I've been a gaming enthusiast for 25 years, and I happily (and legally) own a collection of thousands of titles, nearly 400 of which are here on steam.
I hate Denuvo because it takes away my right to own the product I'm purchasing and limits what I can do with it and, more importantly, endangers my ability to go back and revisit the title in the future when Frontier and Denuvo may or may not still exist. It would hardly be the first game in my library that I've lost to this issue.
Your move.
Probably because it's job had been done, and the game had been finally cracked. By now, anyone who wanted to play it will have bought it.