Protection Strategies Overview
Parallel with advances in software and software security development, software crackers are developing more sophisticated means of deconstructing software protection measures—in order to duplicate and distribute illegal copies of unlicensed software—and to reverse engineer code in order to steal intellectual property.
To maintain the rights to your revenue stream, it is essential that you remain vigilant about the strategies of your “enemies”, and that you continually and wisely implement the latest and strongest techniques for protecting your software.
The degree of investment that you make in limiting the ability of software crackers to illegally access your software will depend on a number of considerations, including:
>The value of your software
>The history of previous cracking attempts related to your software
>The geographical region in which your software will be distributed
>The target market for your software (for example, whether it is intended to be sold to individual consumers, small office/home office users, or enterprise users)
There is no software protection that is absolutely uncrackable. However, if you constantly implement up-to-date strategies using the strongest software protection methods, you significantly decrease your vulnerability to such attacks.
This section describes general protection strategies for software vendors. It then outlines some of the methods that software crackers employ in order to identify and negate software protection and security, and recommends Sentinel LDK measures that you can use to enhance your software security.
In addition to the information described in this manual, our team of Thales Consultants provides personalized assistance in strengthening software security and protection. They can provide help on a wide range of issues, including additional protection strategies and implementation techniques.
For information on consultation services offered by Thales, contact your local Thales representative.