Skip to content
Techniques & Technology

Copy Protection

The anti-piracy arms race

Copy protection evolved from simple disk tricks to elaborate physical manuals and hardware dongles, creating an ongoing battle between publishers and crackers.

C64Amigapczx-spectrum historytechnologypiracy

Overview

Publishers wanted to sell software. Users wanted to copy it. Copy protection became an arms raceโ€”each new technique defeated, each defeat spawning new protection. From bad sectors to code wheels to manual lookups, the battle between protection and cracking shaped software distribution and spawned the crack intro artform.

Fast facts

  • Purpose: Prevent unauthorised copying.
  • Result: Arms race with crackers.
  • Side effects: Legitimate user frustration.
  • Legacy: DRM evolution.

Disk-based protection

MethodTechnique
Bad sectorsIntentional errors
Non-standard formattingUnusual track layouts
Weak bitsInconsistent data
Spiral tracksPhysical impossibilities
Extra tracksBeyond normal range

Manual-based protection

TypeImplementation
Code wheelsPhysical decoder
Word lookupโ€Word 3, line 5, page 12โ€
Symbol matchingMatch manual images
Dark textHard to photocopy

Lenslok

AspectDetail
SystemPlastic prism device
UseDecode on-screen code
ProblemsFinicky, often failed
ReceptionUser frustration

Hardware dongles

PlatformApplication
AmigaParallel port devices
PCProfessional software
ArcadeSecurity chips

Cracker techniques

MethodCounter
Disk analysisFind protection code
PatchingRemove checks
TrainersBypass with options
Complete rewriteLoader replacement

Notable protection systems

SystemPlatform
ProlokMultiple
SpeedlockZX Spectrum
Rob NorthenAmiga
RapidlokC64

User impact

ProblemEffect
Backup inabilityNo personal copies
Hardware failuresLost games
False positivesLegitimate copies rejected
Load timesExtended by checks

Legacy

EvolutionModern form
Disk protectionOnline activation
Manual lookupsAccount systems
DonglesHardware tokens
Arms raceContinues today

See also