SlideShare a Scribd company logo
1 of 18
Download to read offline
We believe we can change how people think of
software and their own value in this world. Our
  inspiration came from the world of humans.


Vatari is the Future standard of
      protecting software
Some of the DRM software used today
includes
  SecuROM
  Starforce
  SafeDisc / Safecast
  XCP (Extended Copy Protection)
  Tages
  Solidshield
  Ubisoft’s new Online Services Platform
  Metafortress
• Most  of it doesn’t last past few hours after the
title launch
• Some are extremely easy to bypass through key
generators or cracked executables
• Some put limits on the opportunity to play
• They all have limited management possibilities
• The toughest ones give publisher bad PR


• The best ones ensure at least few days of pirate
less sales after launch
• Simple  installation code dependency
• Centralized control point of protection
• Heavy generality throughout the protection.
• Identifiable protected parts in the code.
• Relying on the cracker’s low skills.
• Expecting that crackers will give it up soon.
• Trying to outsmart the smartest guys in the
field.
• Protections are designed as layers.
• No experience-based deterring system.
• No unique copy-per-customer technology.
• Doesn’t use centralized point of protection
(easiest point to crack into an application
protection layer)

• Doesn’tneed original source code to be able to
morph protection into it (injects the protection
code on the level of raw PE and PE+ executable)

• Creates
       unique executables for each machine
game should be played on

• Createssymbiotic code with original application
and is nearly impossible to detect (and hence
remove from) there
• Extremely  flexible management and configuration
tools (e.g. proper “no. of installs” solution)

• Characterof the protection makes the cracker to
manually reverse engineer it in order to remove all the
protection (estimates based on currently running test =
10-12 months)

• No online bugging the consumer after the installation
is finished

• However  needs one time online activation (but we
have “offline” solution too)
• Doesn’t use centralized point of protection
(easiest point to crack into an application
protection layer)

• Doesn’tneed original source code to be able to
morph protection into it (injects the protection
code on the level of raw PE and PE+ executable)

• Creates
       unique executables for each machine
game should be played on

• Createssymbiotic code with original application
and is nearly impossible to detect (and hence
remove from) there
;&7'"3.%>H8H6M%",5%/..0%O.#+3.
         ?%6$*"%8                       >"1"3)                O.#+6W4                O1"3R&3#.              8"9.*            4.1"R&313.**             QSM'0"(              O1."7@&3A*             U86<%
       !"#$%#&'(%)*%+,)-+.                   !                      "                      "                    "                    "                     "                        "            !"#$%&'#(
         /0"1%2"(.3%4&5.0                    !                      "                      "                    "           )#*"&%+&#,%+(%%,%,             "                        "            !"#$%&'#(
     6",5&7%8$.&3(%!,9),.                    !                      "                      "                    "                    "                     "                        "            !"#$%&'#(
      :&%;<=<><%3.-+)3.5                     !              )%&*-./+!0+#(12        !+3!"#0&'4%+#(125            "                    !                     !                        !            !"#$%&'#(
           ?&0(7&3'$)*7                      !                      "                      "                    "                    "                     "                        "            !"#$%&'#(
     4&&,@"0A%*1."01$%#&5.                   !                      "                      "                    "                    "                     "                        "            !"#$%&'#(
   ?"**)B.%'3&1.#C&,%&D.3.5                  !                      "                      "                    "                    "                     "                        "            !"#$%&'#(
     /&3.,*)#%)5.,CE#"C&,          !+3&"6&7+"%898':1%5              "                      "                    "                    "                     "                        "            !"#$%&'#(
     <)3.#1%?!=?!F%),G.#C&,                  !               ;/+%(<9(%+*8%,         ;/+%(<9(%+*8%,     )#*"&%+&#,%+(%%,%,   )#*"&%+&#,%+(%%,%,           =>0              ;9"$*61+?91%+)28$%@    !"#$%&'#(
     H,C5.I+9%J%H,C.7+0             AB$"%@%12+8$"#(<           -9,9&*1#*8              0,46(&%,            -9,9&*1#*8               A682             -9,9&*1#*8               -9,9&*1#*8         !"#$%&'#(
:&%),1.3,.1K%H#CB"C&,%'&**)I0.L     !+3C#+0&'46$#"5                 "                      "                   =>0                   "                =#+D62E                       "            !"#$%&'#(
    6."#CB"C&,*%"*%,..5.5         !+3@6F#"+6(,+@9(#"5      .(12+G+6(,+$H6$I8+9$E        J9@9$%,                =>0                   "                   =>0                       =>0           !"#$%&'#(
    ?0"(),9%&,%5)D.3.,1%?;*         !+3K"64%1+@#,%5           G+'@%8+#(12L                 "                   =>0                   "                     !                        !            !"#$%&'#(
        M,*1",1%83)"0%7&5.                   !                      "                      "                    "                    "             MH%(+&"6&7%,+N5                  !            !"#$%&'#(
        N%?"3.,1"0%;&,13&0                   !                      "                      "                    "                    "                     "                        "            !"#$%&'#(
          %%N%H0.31%O(*1.7                   !                      "                      "                    "                    "                     "                        "            !"#$%&'#(
      %N%P.&2&#"C&,%H0.31                    !                      "                      "                    "                    "                     "                        "            !"#$%&'#(
         N%6.7&1.%2&G"#A                     !                      "                      "                    "                    "                     "                        "            !"#$%&'#(
     QOM<%5"1"I"*.%*+''&31                   !                      "                      "                    "                    "                     "                        "            !"#$%&'#(
    6.R.3"0*%",5%4&CB"C&,*             !+3#O'#(615                  "                      "                    "                    "                     "                        "            P98$"9:*'#(
       ;&3'&3"1.%*&0+C&,*                    !                      "                !"#0&'4%+#(12              "                    "                     "                        "            !"#$%&'#(
     QOS%2"+,#$%8&A.,%A.(          !+3;9O%"+7%2Q+#O$L5              "                      "                    "                    "                     "                        "            !"#$%&'#(
        O&#)"0%,.1@&3A),9         !+3"%6,2+R#"+"%R%"6185            "                      "                    "                    "                     "                    !6"'6112         P98$"9:*'#(
           N;0&+5%*1&3"9.              !+36(2+S1%5                  "                      "                    "                    "           !6"'6112+3864%8+#(125              !              T#@R#"$
     <)9)1"0%O13),9%8.#$&0&9(      !+3R*112+8*OO#"$%,5              "                      "                    "                    "                     "                        "            !"#$%&'#(
    ?T?%:.1@&3A*%+C0)U"C&,             !+3#O'#(615                  "                      "                    "                    "                     "                        "            P98$"9:*'#(
      S)18&33.,1%+C0)U"C&,             !+3#O'#(615                  "                      "                    "                    "                     "                        "            P98$"9:*'#(
   <.#.,13"0)U.5%5)*13)I+C&,       !+3P)K+$%&H(#1#<25               "                      "                    "                    "                     "             !6"'6112+3P;PQ+)$%6@5   P98$"9:*'#(
     N%VV%.(+&19%($8+,%@6(,
    Standard “wrapper” protection
    Creates additional protective layer for the
     application
    All IN/OUT operations are redirected through
     own IDT table that creates zombie controlled
     application layer
    Vulnerability in operating memory, where it’s
     easy to trace frequent routine jumps to
     centralized control area
    Typical protection that lasts about 6 hours
    Most similar to Vatari, however…
    Needs application source code to create
     injected protection layer
    Uses centralized point of protection and
     libraries for digital signing, CRC32 control,
     memory control (CRC32 control can be
     switched of, integrity control module can be
     disabled too – both typical starting points for
     any cracker)
• New ground-breaking technology that learned
from the mistakes of the currently used
protections

• Difficult
         to break, and breaking one doesn’t
create generally usable crack solution

• Easy
     on consumer, especially compared to
SecuROM or Ubi protection

• Great   for both online and offline distribution

• We   promise you wouldn’t regret trying it!
Gamster Center
 Desktop client for end-user
 Allows complete management of games/applicatiopns portfolio
 Do we have web interface?


Torrent support
 Cost efficient data/content distribution
 Own torrent client
 Integrated Seed2See motivational program (seed and get points
to buy DLC or bonuses)
Cloud Storage
 Mirroring of selected files/folders on the server
 E.g. saved positions for those who travel or simply use
more computers

Trial functions for games/applications
 Vatari allows limited number of starts, time limited (as
play time or as calendar time)

Viper USB Key
 HW login into user account, allows installing and playing
games on other computers as long as USB is inserted
 “offline” activation of games/applications
Parental lock
 Allows e.g. set number of hours a game can be played
every day
 Includes alert system, that provides email alerts to parents
about played games
 Includes LoJack, remote disabling of game/application on
specific account or computer

Travel & Play
 Allows simultaneous installations on more devices, but
play only on one at a time

Social networking
 Twitter / Facebook updates
USID system
 Application on each machine is unique
 This allows forensic identification, passive software
protection, also identification for call center, etc.
andy.svakova@vatari.com
    www.vatari.com
   00 421 915 104 103

More Related Content

Recently uploaded

一比一原版(YU毕业证书)约克大学毕业证成绩单原件一模一样
一比一原版(YU毕业证书)约克大学毕业证成绩单原件一模一样一比一原版(YU毕业证书)约克大学毕业证成绩单原件一模一样
一比一原版(YU毕业证书)约克大学毕业证成绩单原件一模一样dyuozua
 
一比一原版(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样
一比一原版(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样一比一原版(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样
一比一原版(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样dyuozua
 
Teck Supplemental Information, May 2, 2024
Teck Supplemental Information, May 2, 2024Teck Supplemental Information, May 2, 2024
Teck Supplemental Information, May 2, 2024TeckResourcesLtd
 
Teekay Tankers Q1-24 Earnings Presentation
Teekay Tankers Q1-24 Earnings PresentationTeekay Tankers Q1-24 Earnings Presentation
Teekay Tankers Q1-24 Earnings PresentationTeekay Tankers Ltd
 
Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCamil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCAMILRI
 
一比一原版(QU毕业证书)女王大学毕业证成绩单原件一模一样
一比一原版(QU毕业证书)女王大学毕业证成绩单原件一模一样一比一原版(QU毕业证书)女王大学毕业证成绩单原件一模一样
一比一原版(QU毕业证书)女王大学毕业证成绩单原件一模一样dyuozua
 
一比一原版(UNITEC毕业证书)UNITEC理工学院毕业证成绩单原件一模一样
一比一原版(UNITEC毕业证书)UNITEC理工学院毕业证成绩单原件一模一样一比一原版(UNITEC毕业证书)UNITEC理工学院毕业证成绩单原件一模一样
一比一原版(UNITEC毕业证书)UNITEC理工学院毕业证成绩单原件一模一样dyuozua
 
abortion pills in Riyadh+966572737505 Cytotec Riyadh
abortion pills in  Riyadh+966572737505    Cytotec Riyadhabortion pills in  Riyadh+966572737505    Cytotec Riyadh
abortion pills in Riyadh+966572737505 Cytotec Riyadhsamsungultra782445
 
Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCamil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCAMILRI
 
BofA Securities GMM and Steel Conference
BofA Securities GMM and Steel ConferenceBofA Securities GMM and Steel Conference
BofA Securities GMM and Steel ConferenceTeckResourcesLtd
 
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024Osisko Gold Royalties Ltd
 
Financial Results for the Fiscal Year Ended March 2024
Financial Results for the Fiscal Year Ended March 2024Financial Results for the Fiscal Year Ended March 2024
Financial Results for the Fiscal Year Ended March 2024KDDI
 
一比一原版(Otago毕业证书)奥塔哥大学毕业证成绩单原件一模一样
一比一原版(Otago毕业证书)奥塔哥大学毕业证成绩单原件一模一样一比一原版(Otago毕业证书)奥塔哥大学毕业证成绩单原件一模一样
一比一原版(Otago毕业证书)奥塔哥大学毕业证成绩单原件一模一样dyuozua
 
Teck Sustainability Leadership, April 26, 2024
Teck Sustainability Leadership, April 26, 2024Teck Sustainability Leadership, April 26, 2024
Teck Sustainability Leadership, April 26, 2024TeckResourcesLtd
 
Corporate Presentation Probe May 2024.pdf
Corporate Presentation Probe May 2024.pdfCorporate Presentation Probe May 2024.pdf
Corporate Presentation Probe May 2024.pdfProbe Gold
 
一比一原版(Waikato毕业证书)怀卡托大学毕业证成绩单原件一模一样
一比一原版(Waikato毕业证书)怀卡托大学毕业证成绩单原件一模一样一比一原版(Waikato毕业证书)怀卡托大学毕业证成绩单原件一模一样
一比一原版(Waikato毕业证书)怀卡托大学毕业证成绩单原件一模一样dyuozua
 
一比一原版(UNITEC毕业证书)UNITEC理工学院毕业证成绩单原件一模一样
一比一原版(UNITEC毕业证书)UNITEC理工学院毕业证成绩单原件一模一样一比一原版(UNITEC毕业证书)UNITEC理工学院毕业证成绩单原件一模一样
一比一原版(UNITEC毕业证书)UNITEC理工学院毕业证成绩单原件一模一样dyuozua
 
#1 Kasamba love spells caster (+277-99-215-634) verified love spells caster i...
#1 Kasamba love spells caster (+277-99-215-634) verified love spells caster i...#1 Kasamba love spells caster (+277-99-215-634) verified love spells caster i...
#1 Kasamba love spells caster (+277-99-215-634) verified love spells caster i...Baba Mkuru
 
一比一原版(VUW毕业证书)惠灵顿维多利亚大学毕业证成绩单原件一模一样
一比一原版(VUW毕业证书)惠灵顿维多利亚大学毕业证成绩单原件一模一样一比一原版(VUW毕业证书)惠灵顿维多利亚大学毕业证成绩单原件一模一样
一比一原版(VUW毕业证书)惠灵顿维多利亚大学毕业证成绩单原件一模一样dyuozua
 
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样sovco
 

Recently uploaded (20)

一比一原版(YU毕业证书)约克大学毕业证成绩单原件一模一样
一比一原版(YU毕业证书)约克大学毕业证成绩单原件一模一样一比一原版(YU毕业证书)约克大学毕业证成绩单原件一模一样
一比一原版(YU毕业证书)约克大学毕业证成绩单原件一模一样
 
一比一原版(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样
一比一原版(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样一比一原版(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样
一比一原版(UoA毕业证书)奥克兰大学毕业证成绩单原件一模一样
 
Teck Supplemental Information, May 2, 2024
Teck Supplemental Information, May 2, 2024Teck Supplemental Information, May 2, 2024
Teck Supplemental Information, May 2, 2024
 
Teekay Tankers Q1-24 Earnings Presentation
Teekay Tankers Q1-24 Earnings PresentationTeekay Tankers Q1-24 Earnings Presentation
Teekay Tankers Q1-24 Earnings Presentation
 
Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCamil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdf
 
一比一原版(QU毕业证书)女王大学毕业证成绩单原件一模一样
一比一原版(QU毕业证书)女王大学毕业证成绩单原件一模一样一比一原版(QU毕业证书)女王大学毕业证成绩单原件一模一样
一比一原版(QU毕业证书)女王大学毕业证成绩单原件一模一样
 
一比一原版(UNITEC毕业证书)UNITEC理工学院毕业证成绩单原件一模一样
一比一原版(UNITEC毕业证书)UNITEC理工学院毕业证成绩单原件一模一样一比一原版(UNITEC毕业证书)UNITEC理工学院毕业证成绩单原件一模一样
一比一原版(UNITEC毕业证书)UNITEC理工学院毕业证成绩单原件一模一样
 
abortion pills in Riyadh+966572737505 Cytotec Riyadh
abortion pills in  Riyadh+966572737505    Cytotec Riyadhabortion pills in  Riyadh+966572737505    Cytotec Riyadh
abortion pills in Riyadh+966572737505 Cytotec Riyadh
 
Camil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdfCamil Institutional Presentation_Mai24.pdf
Camil Institutional Presentation_Mai24.pdf
 
BofA Securities GMM and Steel Conference
BofA Securities GMM and Steel ConferenceBofA Securities GMM and Steel Conference
BofA Securities GMM and Steel Conference
 
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
Osisko Gold Royalties Ltd - Corporate Presentation, May 2024
 
Financial Results for the Fiscal Year Ended March 2024
Financial Results for the Fiscal Year Ended March 2024Financial Results for the Fiscal Year Ended March 2024
Financial Results for the Fiscal Year Ended March 2024
 
一比一原版(Otago毕业证书)奥塔哥大学毕业证成绩单原件一模一样
一比一原版(Otago毕业证书)奥塔哥大学毕业证成绩单原件一模一样一比一原版(Otago毕业证书)奥塔哥大学毕业证成绩单原件一模一样
一比一原版(Otago毕业证书)奥塔哥大学毕业证成绩单原件一模一样
 
Teck Sustainability Leadership, April 26, 2024
Teck Sustainability Leadership, April 26, 2024Teck Sustainability Leadership, April 26, 2024
Teck Sustainability Leadership, April 26, 2024
 
Corporate Presentation Probe May 2024.pdf
Corporate Presentation Probe May 2024.pdfCorporate Presentation Probe May 2024.pdf
Corporate Presentation Probe May 2024.pdf
 
一比一原版(Waikato毕业证书)怀卡托大学毕业证成绩单原件一模一样
一比一原版(Waikato毕业证书)怀卡托大学毕业证成绩单原件一模一样一比一原版(Waikato毕业证书)怀卡托大学毕业证成绩单原件一模一样
一比一原版(Waikato毕业证书)怀卡托大学毕业证成绩单原件一模一样
 
一比一原版(UNITEC毕业证书)UNITEC理工学院毕业证成绩单原件一模一样
一比一原版(UNITEC毕业证书)UNITEC理工学院毕业证成绩单原件一模一样一比一原版(UNITEC毕业证书)UNITEC理工学院毕业证成绩单原件一模一样
一比一原版(UNITEC毕业证书)UNITEC理工学院毕业证成绩单原件一模一样
 
#1 Kasamba love spells caster (+277-99-215-634) verified love spells caster i...
#1 Kasamba love spells caster (+277-99-215-634) verified love spells caster i...#1 Kasamba love spells caster (+277-99-215-634) verified love spells caster i...
#1 Kasamba love spells caster (+277-99-215-634) verified love spells caster i...
 
一比一原版(VUW毕业证书)惠灵顿维多利亚大学毕业证成绩单原件一模一样
一比一原版(VUW毕业证书)惠灵顿维多利亚大学毕业证成绩单原件一模一样一比一原版(VUW毕业证书)惠灵顿维多利亚大学毕业证成绩单原件一模一样
一比一原版(VUW毕业证书)惠灵顿维多利亚大学毕业证成绩单原件一模一样
 
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
一比一原版(EUR毕业证书)鹿特丹伊拉斯姆斯大学毕业证原件一模一样
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

End of illegal copies

  • 1.
  • 2. We believe we can change how people think of software and their own value in this world. Our inspiration came from the world of humans. Vatari is the Future standard of protecting software
  • 3. Some of the DRM software used today includes SecuROM Starforce SafeDisc / Safecast XCP (Extended Copy Protection) Tages Solidshield Ubisoft’s new Online Services Platform Metafortress
  • 4. • Most of it doesn’t last past few hours after the title launch • Some are extremely easy to bypass through key generators or cracked executables • Some put limits on the opportunity to play • They all have limited management possibilities • The toughest ones give publisher bad PR • The best ones ensure at least few days of pirate less sales after launch
  • 5. • Simple installation code dependency • Centralized control point of protection • Heavy generality throughout the protection. • Identifiable protected parts in the code. • Relying on the cracker’s low skills. • Expecting that crackers will give it up soon. • Trying to outsmart the smartest guys in the field. • Protections are designed as layers. • No experience-based deterring system. • No unique copy-per-customer technology.
  • 6. • Doesn’t use centralized point of protection (easiest point to crack into an application protection layer) • Doesn’tneed original source code to be able to morph protection into it (injects the protection code on the level of raw PE and PE+ executable) • Creates unique executables for each machine game should be played on • Createssymbiotic code with original application and is nearly impossible to detect (and hence remove from) there
  • 7. • Extremely flexible management and configuration tools (e.g. proper “no. of installs” solution) • Characterof the protection makes the cracker to manually reverse engineer it in order to remove all the protection (estimates based on currently running test = 10-12 months) • No online bugging the consumer after the installation is finished • However needs one time online activation (but we have “offline” solution too)
  • 8. • Doesn’t use centralized point of protection (easiest point to crack into an application protection layer) • Doesn’tneed original source code to be able to morph protection into it (injects the protection code on the level of raw PE and PE+ executable) • Creates unique executables for each machine game should be played on • Createssymbiotic code with original application and is nearly impossible to detect (and hence remove from) there
  •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
  • 10.   Standard “wrapper” protection   Creates additional protective layer for the application   All IN/OUT operations are redirected through own IDT table that creates zombie controlled application layer   Vulnerability in operating memory, where it’s easy to trace frequent routine jumps to centralized control area   Typical protection that lasts about 6 hours
  • 11.   Most similar to Vatari, however…   Needs application source code to create injected protection layer   Uses centralized point of protection and libraries for digital signing, CRC32 control, memory control (CRC32 control can be switched of, integrity control module can be disabled too – both typical starting points for any cracker)
  • 12.
  • 13. • New ground-breaking technology that learned from the mistakes of the currently used protections • Difficult to break, and breaking one doesn’t create generally usable crack solution • Easy on consumer, especially compared to SecuROM or Ubi protection • Great for both online and offline distribution • We promise you wouldn’t regret trying it!
  • 14. Gamster Center  Desktop client for end-user  Allows complete management of games/applicatiopns portfolio  Do we have web interface? Torrent support  Cost efficient data/content distribution  Own torrent client  Integrated Seed2See motivational program (seed and get points to buy DLC or bonuses)
  • 15. Cloud Storage  Mirroring of selected files/folders on the server  E.g. saved positions for those who travel or simply use more computers Trial functions for games/applications  Vatari allows limited number of starts, time limited (as play time or as calendar time) Viper USB Key  HW login into user account, allows installing and playing games on other computers as long as USB is inserted  “offline” activation of games/applications
  • 16. Parental lock  Allows e.g. set number of hours a game can be played every day  Includes alert system, that provides email alerts to parents about played games  Includes LoJack, remote disabling of game/application on specific account or computer Travel & Play  Allows simultaneous installations on more devices, but play only on one at a time Social networking  Twitter / Facebook updates
  • 17. USID system  Application on each machine is unique  This allows forensic identification, passive software protection, also identification for call center, etc.
  • 18. andy.svakova@vatari.com www.vatari.com 00 421 915 104 103