Hi,
I want to continue on my previous question: http://stackoverflow.com/questions/3007168/torrents-can-i-protect-my-software-by-sending-wrong-bytes
Developer Art suggested to add a unique key to the application, to identifier the cracker.
But JAB said that crackers can search where my unique key is located by checking for binary differences, if the cracker has multiple copies of my software. Then crackers change that key to make them self anonymous.
That is true.
Now comes the question: If I want to add a unique key, are there tools to shuffle (a kind of obfuscation) the program modules? So, that a binary compare would say that the two files are completely different. So they can't locate the identifier key.
I'm pretty sure it is possible (maybe by replacing assembler blocks and make some jumps).
I think it would be enough to make 30 to 40 shuffles of my software.
Thanks