MCM Resource Anti-Piracy Placeholders - Historical

Applied By Justis R: Jul 21, 2019 at 10:47 PM

MCM Resource Anti-Piracy Placeholders
Old VersionNew Version
51Our most effective option is to ensure that whatever DMR systems we include in our product, they are well hidden and or very difficult to remove without impairing the functionality of the product. 51Our most effective option is to ensure that whatever DMR systems we include in our product, they are well hidden and or very difficult to remove without impairing the functionality of the product. 
52Be creative. Be unique. If you follow suit with what every other developer is doing, crackers will expect those methods to be used, and will know what to look for when opening your product. It is for that reason that we are not listing specific methods here, nor do we offer a standard injected DRM system. 52Be creative. Be unique. If you follow suit with what every other developer is doing, crackers will expect those methods to be used, and will know what to look for when opening your product. It is for that reason that we are not listing specific methods here, nor do we offer a standard injected DRM system. 
53 53 
54If you do have your DRM system disable, delete, or otherwise change the experience of the product when a leak is detected, it is recommended that you keep identifiable data separate from that functionality, so that the data needed to trace back the copy to its original downloader is not removed, and the leaker’s MCM account can be terminated. 54If you do have your DRM system disable, delete, or otherwise change the experience of the product when a leak is detected, it is recommended that you keep identifiable data separate from that functionality, so that the data needed to trace back the copy to its original downloader is not removed, and the leaker’s MCM account can be banned.
55[/INDENT] 55[/INDENT] 
56[SIZE=5][B]Limitations[/B][/SIZE] 56[SIZE=5][B]Limitations[/B][/SIZE] 
57[INDENT] 57[INDENT]