Our inspiration came from the world of humans. No two human individuals are composed of exactly the same genetic DNA profile which is a fact we like. We have been working on applying this process on our protection software for the past 6 years. It means your software is going to have a revolutionary protection based on its own unique protection mechanism similar to human's DNA. There is no Human Clone, there will be no Software Copy with Vatari. Vatari redefines how we think of software. The term Copy stops existing. The world will be full of originals. Let`s enter the future standard of protection.
2. We believe we can change how people think of
software and their own value in this world. Our
inspiration came from the world of humans.
Vatari is the Future standard of
protecting software
3. Some of the DRM software used today
includes
SecuROM
Starforce
SafeDisc / Safecast
XCP (Extended Copy Protection)
Tages
Solidshield
Ubisoft’s new Online Services Platform
Metafortress
4. • Most of it doesn’t last past few hours after the
title launch
• Some are extremely easy to bypass through key
generators or cracked executables
• Some put limits on the opportunity to play
• They all have limited management possibilities
• The toughest ones give publisher bad PR
• The best ones ensure at least few days of pirate
less sales after launch
5. • Simple installation code dependency
• Centralized control point of protection
• Heavy generality throughout the protection.
• Identifiable protected parts in the code.
• Relying on the cracker’s low skills.
• Expecting that crackers will give it up soon.
• Trying to outsmart the smartest guys in the
field.
• Protections are designed as layers.
• No experience-based deterring system.
• No unique copy-per-customer technology.
6. • Doesn’t use centralized point of protection
(easiest point to crack into an application
protection layer)
• Doesn’tneed original source code to be able to
morph protection into it (injects the protection
code on the level of raw PE and PE+ executable)
• Creates
unique executables for each machine
game should be played on
• Createssymbiotic code with original application
and is nearly impossible to detect (and hence
remove from) there
7. • Extremely flexible management and configuration
tools (e.g. proper “no. of installs” solution)
• Characterof the protection makes the cracker to
manually reverse engineer it in order to remove all the
protection (estimates based on currently running test =
10-12 months)
• No online bugging the consumer after the installation
is finished
• However needs one time online activation (but we
have “offline” solution too)
8. • Doesn’t use centralized point of protection
(easiest point to crack into an application
protection layer)
• Doesn’tneed original source code to be able to
morph protection into it (injects the protection
code on the level of raw PE and PE+ executable)
• Creates
unique executables for each machine
game should be played on
• Createssymbiotic code with original application
and is nearly impossible to detect (and hence
remove from) there
10. Standard “wrapper” protection
Creates additional protective layer for the
application
All IN/OUT operations are redirected through
own IDT table that creates zombie controlled
application layer
Vulnerability in operating memory, where it’s
easy to trace frequent routine jumps to
centralized control area
Typical protection that lasts about 6 hours
11. Most similar to Vatari, however…
Needs application source code to create
injected protection layer
Uses centralized point of protection and
libraries for digital signing, CRC32 control,
memory control (CRC32 control can be
switched of, integrity control module can be
disabled too – both typical starting points for
any cracker)
12.
13. • New ground-breaking technology that learned
from the mistakes of the currently used
protections
• Difficult
to break, and breaking one doesn’t
create generally usable crack solution
• Easy
on consumer, especially compared to
SecuROM or Ubi protection
• Great for both online and offline distribution
• We promise you wouldn’t regret trying it!
14. Gamster Center
Desktop client for end-user
Allows complete management of games/applicatiopns portfolio
Do we have web interface?
Torrent support
Cost efficient data/content distribution
Own torrent client
Integrated Seed2See motivational program (seed and get points
to buy DLC or bonuses)
15. Cloud Storage
Mirroring of selected files/folders on the server
E.g. saved positions for those who travel or simply use
more computers
Trial functions for games/applications
Vatari allows limited number of starts, time limited (as
play time or as calendar time)
Viper USB Key
HW login into user account, allows installing and playing
games on other computers as long as USB is inserted
“offline” activation of games/applications
16. Parental lock
Allows e.g. set number of hours a game can be played
every day
Includes alert system, that provides email alerts to parents
about played games
Includes LoJack, remote disabling of game/application on
specific account or computer
Travel & Play
Allows simultaneous installations on more devices, but
play only on one at a time
Social networking
Twitter / Facebook updates
17. USID system
Application on each machine is unique
This allows forensic identification, passive software
protection, also identification for call center, etc.