end of illegal copies
DESCRIPTION
Our inspiration came from the world of humans. No two human individuals are composed of exactly the same genetic DNA profile which is a fact we like. We have been working on applying this process on our protection software for the past 6 years. It means your software is going to have a revolutionary protection based on its own unique protection mechanism similar to human's DNA. There is no Human Clone, there will be no Software Copy with Vatari. Vatari redefines how we think of software. The term Copy stops existing. The world will be full of originals. Let`s enter the future standard of protection.TRANSCRIPT
We believe we can change how people think of software and their own value in this world. Our
inspiration came from the world of humans.
Vatari is the Future standard of protecting software
Some of the DRM software used today includes
SecuROM Starforce SafeDisc / Safecast XCP (Extended Copy Protection) Tages Solidshield Ubisoft’s new Online Services Platform Metafortress
• Most of it doesn’t last past few hours after the title launch • Some are extremely easy to bypass through key generators or cracked executables • Some put limits on the opportunity to play • They all have limited management possibilities • The toughest ones give publisher bad PR
• The best ones ensure at least few days of pirate less sales after launch
• Simple installation code dependency • Centralized control point of protection • Heavy generality throughout the protection. • Identifiable protected parts in the code. • Relying on the cracker’s low skills. • Expecting that crackers will give it up soon. • Trying to outsmart the smartest guys in the field. • Protections are designed as layers. • No experience-based deterring system. • No unique copy-per-customer technology.
• Doesn’t use centralized point of protection (easiest point to crack into an application protection layer)
• Doesn’t need original source code to be able to morph protection into it (injects the protection code on the level of raw PE and PE+ executable)
• Creates unique executables for each machine game should be played on
• Creates symbiotic code with original application and is nearly impossible to detect (and hence remove from) there
• Extremely flexible management and configuration tools (e.g. proper “no. of installs” solution)
• Character of the protection makes the cracker to manually reverse engineer it in order to remove all the protection (estimates based on currently running test = 10-12 months)
• No online bugging the consumer after the installation is finished
• However needs one time online activation (but we have “offline” solution too)
• Doesn’t use centralized point of protection (easiest point to crack into an application protection layer)
• Doesn’t need original source code to be able to morph protection into it (injects the protection code on the level of raw PE and PE+ executable)
• Creates unique executables for each machine game should be played on
• Creates symbiotic code with original application and is nearly impossible to detect (and hence remove from) there
!"#$%#&'(%)*%+,)-+. ! " " " " " " !"#$%&'#(/0"1%2"(.3%4&5.0 ! " " " )#*"&%+&#,%+(%%,%, " " !"#$%&'#(
6",5&7%8$.&3(%!,9),. ! " " " " " " !"#$%&'#(:&%;<=<><%3.-+)3.5 ! )%&*-./+!0+#(12 !+3!"#0&'4%+#(125 " ! ! ! !"#$%&'#(
?&0(7&3'$)*7 ! " " " " " " !"#$%&'#(4&&,@"0A%*1."01$%#&5. ! " " " " " " !"#$%&'#(
?"**)B.%'3&1.#C&,%&D.3.5 ! " " " " " " !"#$%&'#(/&3.,*)#%)5.,CE#"C&, !+3&"6&7+"%898':1%5 " " " " " " !"#$%&'#(<)3.#1%?!=?!F%),G.#C&, ! ;/+%(<9(%+*8%, ;/+%(<9(%+*8%, )#*"&%+&#,%+(%%,%, )#*"&%+&#,%+(%%,%, =>0 ;9"$*61+?91%+)28$%@ !"#$%&'#(H,C5.I+9%J%H,C.7+0 AB$"%@%12+8$"#(< -9,9&*1#*8 0,46(&%, -9,9&*1#*8 A682 -9,9&*1#*8 -9,9&*1#*8 !"#$%&'#(
:&%),1.3,.1K%H#CB"C&,%'&**)I0.L !+3C#+0&'46$#"5 " " =>0 " =#+D62E " !"#$%&'#(6."#CB"C&,*%"*%,..5.5 !+3@6F#"+6(,+@9(#"5 .(12+G+6(,+$H6$I8+9$E J9@9$%, =>0 " =>0 =>0 !"#$%&'#(?0"(),9%&,%5)D.3.,1%?;* !+3K"64%1+@#,%5 G+'@%8+#(12L " =>0 " ! ! !"#$%&'#(
M,*1",1%83)"0%7&5. ! " " " " MH%(+&"6&7%,+N5 ! !"#$%&'#(N%?"3.,1"0%;&,13&0 ! " " " " " " !"#$%&'#(%%N%H0.31%O(*1.7 ! " " " " " " !"#$%&'#(
%N%P.&2&#"C&,%H0.31 ! " " " " " " !"#$%&'#(N%6.7&1.%2&G"#A ! " " " " " " !"#$%&'#(
QOM<%5"1"I"*.%*+''&31 ! " " " " " " !"#$%&'#(6.R.3"0*%",5%4&CB"C&,* !+3#O'#(615 " " " " " " P98$"9:*'#(
;&3'&3"1.%*&0+C&,* ! " !"#0&'4%+#(12 " " " " !"#$%&'#(QOS%2"+,#$%8&A.,%A.( !+3;9O%"+7%2Q+#O$L5 " " " " " " !"#$%&'#(O&#)"0%,.1@&3A),9 !+3"%6,2+R#"+"%R%"6185 " " " " " !6"'6112 P98$"9:*'#(N;0&+5%*1&3"9. !+36(2+S1%5 " " " " !6"'6112+3864%8+#(125 ! T#@R#"$
<)9)1"0%O13),9%8.#$&0&9( !+3R*112+8*OO#"$%,5 " " " " " " !"#$%&'#(?T?%:.1@&3A*%+C0)U"C&, !+3#O'#(615 " " " " " " P98$"9:*'#(S)18&33.,1%+C0)U"C&, !+3#O'#(615 " " " " " " P98$"9:*'#(
<.#.,13"0)U.5%5)*13)I+C&, !+3P)K+$%&H(#1#<25 " " " " " !6"'6112+3P;PQ+)$%6@5 P98$"9:*'#(N%VV%.(+&19%($8+,%@6(,
U86<%O1."7@&3A*
;&7'"3.%>H8H6M%",5%/..0%O.#+3.
?%6$*"%8 >"1"3) O.#+6W4 O1"3R&3#. 8"9.* 4.1"R&313.** QSM'0"(
Standard “wrapper” protection Creates additional protective layer for the
application All IN/OUT operations are redirected through
own IDT table that creates zombie controlled application layer
Vulnerability in operating memory, where it’s easy to trace frequent routine jumps to centralized control area
Typical protection that lasts about 6 hours
Most similar to Vatari, however… Needs application source code to create
injected protection layer Uses centralized point of protection and
libraries for digital signing, CRC32 control, memory control (CRC32 control can be switched of, integrity control module can be disabled too – both typical starting points for any cracker)
• New ground-breaking technology that learned from the mistakes of the currently used protections
• Difficult to break, and breaking one doesn’t create generally usable crack solution
• Easy on consumer, especially compared to SecuROM or Ubi protection
• Great for both online and offline distribution
• We promise you wouldn’t regret trying it!
Gamster Center Desktop client for end-user Allows complete management of games/applicatiopns portfolio Do we have web interface?
Torrent support Cost efficient data/content distribution Own torrent client Integrated Seed2See motivational program (seed and get points to buy DLC or bonuses)
Cloud Storage Mirroring of selected files/folders on the server E.g. saved positions for those who travel or simply use more computers
Trial functions for games/applications Vatari allows limited number of starts, time limited (as play time or as calendar time)
Viper USB Key HW login into user account, allows installing and playing games on other computers as long as USB is inserted “offline” activation of games/applications
Parental lock Allows e.g. set number of hours a game can be played every day Includes alert system, that provides email alerts to parents about played games Includes LoJack, remote disabling of game/application on specific account or computer
Travel & Play Allows simultaneous installations on more devices, but play only on one at a time
Social networking Twitter / Facebook updates
USID system Application on each machine is unique This allows forensic identification, passive software protection, also identification for call center, etc.
[email protected] www.vatari.com
00 421 915 104 103