Stories
Slash Boxes
Comments

SoylentNews is people

posted by n1 on Monday May 29 2017, @10:37PM   Printer-friendly
from the challenge-accepted dept.

Game studios that use digital rights management (DRM) tools tend to defend it to the death, even after it's been cracked. It prevents 'casual' piracy and cheating, they sometimes argue. However, Rime developer Tequila Works is taking a decidedly different approach. It claims that it'll remove Denuvo, the anti-tampering/DRM system on the Windows version of Rime, if someone cracks its island puzzle title. This is an odd promise to make, especially since it amounts to an inadvertent dare -- find a way to break in and the developers will eliminate the need for that crack.

This wouldn't be so unusual a statement if there weren't a history of Denuvo cracks. While it's harder to defeat this code than earlier schemes, it's definitely not impossible. Recent games like Resident Evil 7 and Prey had their Denuvo implementations broken within days of release, while developers have patched it out on titles like Doom and Inside. Tequila Works is aware that cracking is likely more a question of "when" than "if," but it appears to be optimistic about the challenge involved.

Source: ArsTechnica


Original Submission

Related Stories

Voksi Releases Detailed Denuvo-Cracking Video Tutorial 2 comments

Submitted via IRC for TheMightyBuzzard

Over the past few years, the name Voksi has become synonymous with game cracking, in particular when it comes to anti-Denuvo activities. This week the talented Bulgarian released a 90-minute video in which he reveals how he cracked V4 of the infamous anti-tamper technology. TorrentFreak caught up with him for the lowdown.

Source: https://torrentfreak.com/voksi-releases-detailed-denuvo-cracking-video-tutorial-180210/

Denuvo "is an anti-tamper technology and digital rights management (DRM) scheme developed by the Austrian company Denuvo Software Solutions GmbH".

Related: Denuvo Forgets to Secure Server, Leaks Years of Messages From Game Makers
More Powerful Denuvo DRM Cracked 10 Days After Release of PREY
'Rime' Creators Will Remove Anti-Tampering Code If It's Cracked
New "Out of Control" Denuvo Piracy Protection Cracked
Denuvo Accused of Using Unlicensed Software to Protect its Anti-Piracy Tool
Denuvo License Generator is Latest Circumvention Method


Original Submission

Remove Denuvo DRM, Gain Up to 20 FPS in Devil May Cry 5 16 comments

Denuvo-Free Devil May Cry 5 Reportedly Improves the Game's Performance by Up to 20FPS

It appears that Denuvo's anti-tamper tech has significant impact on Devil May Cry 5's performance, and a Denuvo-free .exe game file has now surfaced online.

The Devil May Cry 5 .exe file was actually released by Capcom following the game's release earlier today, but has now been pulled. However, the file can still be downloaded through the Steam console. Several users are reporting FPS improvements by up to 20FPS while using the Denuvo-free exe file.

Sound familiar? Devil May Cry 5 is the game AMD demoed running on a Radeon VII GPU at its CES 2019 keynote. I wonder if they were running it with DRM.

Average frame rates are only part of the story when it comes to a game's performance. Minimum frame rates, percentiles, etc. can measure frame stuttering. A significant boost in a game's performance can also increase minimum frame rates.

Related:


Original Submission

This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
(1)
  • (Score: 0) by Anonymous Coward on Monday May 29 2017, @10:47PM (4 children)

    by Anonymous Coward on Monday May 29 2017, @10:47PM (#517354)

    The game studios used to be cool. Id released engine source code. Epic quietly released patches that removed DRM.

    These days? Fuck them all to death.

    • (Score: 0) by Anonymous Coward on Monday May 29 2017, @10:53PM (3 children)

      by Anonymous Coward on Monday May 29 2017, @10:53PM (#517356)
      • (Score: 0) by Anonymous Coward on Monday May 29 2017, @11:14PM (2 children)

        by Anonymous Coward on Monday May 29 2017, @11:14PM (#517363)

        Good luck ever getting the source to id tech 5.

        • (Score: 3, Interesting) by Anonymous Coward on Tuesday May 30 2017, @12:38AM (1 child)

          by Anonymous Coward on Tuesday May 30 2017, @12:38AM (#517397)

          Some hacker got ahold of it and released it online, then after outcry when iD tried to stifle it, they released it under some restrictive non-commercial license, then finally after quake had been out a few years or something they released doom, first under the restrictive license, then re-released it licensed under the GPLv2 (although only the last version of Doom, meaning a number of cool features had been stripped out, like the triple-head singleplayer mode utilizing 3 systems over a lan for the front/left/right viewscreens.)

          Furthermore as was brought up, iD had defrauded their employers at SoftDisk by developing their software on company time and trying to end run around them to publish it elsewhere. That is how that 7th Commander Keen game came around (Keen Dreams?) as a settlement of that. Combined with Carmack doing similiar over the whole Oculus thing (which I will note he joined onto late anyway.) there really isn't a lot of respect to be had anymore. Having said that, he, the Williams (of Sierra fame, and all their country bumpkin programmers!), and a variety of others should be lauded for giving us a period of moderately independent gaming developers in an era that helped show the little guy could be innovative and make a huge splash. But claiming any of them were 'good guys' is glossing over lots of nastiness in the industry that isn't just the big players (although they are the most egregious.)

          P.S. Don't forget the Roberts, currenting bilking upwards of 250 million for their 'Star Citizen' game, which is then going to bilk even more millions in downloadable content even though that is enough money to make all developers 'millionaires' overnight, as if the Roberts at least didn't already have millions they could've been funding with...

          • (Score: 3, Funny) by boltronics on Tuesday May 30 2017, @03:33AM

            by boltronics (580) on Tuesday May 30 2017, @03:33AM (#517442) Homepage Journal

            I remember being horrified as a kid, learning the working conditions of programmers made to suffer Ken Williams' wrath.

            You can see him here [sierrachest.com] (scroll down a bit) whipping the workers in their cubicles.

            --
            It's GNU/Linux dammit!
  • (Score: 0) by Anonymous Coward on Monday May 29 2017, @11:17PM (6 children)

    by Anonymous Coward on Monday May 29 2017, @11:17PM (#517366)

    I suspect that what's going on here is that the game devs may be calling the bluff of the DRM merchants, and saying, basically: "If it isn't preventing copying, we're yanking this customer-hostile shit. And not paying you again."

    It makes a lot more sense than just daring the community to do what you know damn well they'll do anyway.

    • (Score: 2) by zocalo on Monday May 29 2017, @11:46PM (3 children)

      by zocalo (302) on Monday May 29 2017, @11:46PM (#517376)
      Maybe they've even got Denuvo to sign up to some kind of "if they break our DRM, we'll give you your money back" deal? If, as TFS implies, they're expecting it to get broken eventually, then the sooner that happens the sooner they'll be getting their money back, so throwing down the gauntlet might actually help their bottom line. Besides, regardless of whether the DRM gets cracked or not, it's also a nice PR move since the free advertising stories like this are going to give them will raise awareness of the game and likely generate some additional legit sales that'll help offset any losses through people potentially getting a cracked/DRM free version.
      --
      UNIX? They're not even circumcised! Savages!
      • (Score: 4, Interesting) by sjames on Monday May 29 2017, @11:55PM (1 child)

        by sjames (2882) on Monday May 29 2017, @11:55PM (#517379) Journal

        It does make good advertising either way.

        It could also be a counter to the argument that once something is cracked, the 'pirates' are offering a product superior to the original. This way they use the DRM to gain a few more days exclusivity and then once the crack is out there remove the DRM (that is no longer helpful) to avoid offering an inferior product.

        • (Score: 2) by bob_super on Tuesday May 30 2017, @07:38PM

          by bob_super (1357) on Tuesday May 30 2017, @07:38PM (#517848)

          This.
          The first couple weeks are critical for sales (says the guy playing TF2 and other older games), and then you might as well offer the product without the encumberance.

          Maybe they pay Denuvo per install, which makes no sense after the DRM gets cracked.

      • (Score: 2) by Wootery on Tuesday May 30 2017, @08:17AM

        by Wootery (2341) on Tuesday May 30 2017, @08:17AM (#517528)

        If, as TFS implies, they're expecting it to get broken eventually, then the sooner that happens the sooner they'll be getting their money back

        But the Denuvo team know their product can be defeated. They can hardly be oblivious to the fact that all its previous incarnations have been defeated. They'd never offer a refund-if-broken.

    • (Score: 4, Interesting) by c0lo on Tuesday May 30 2017, @01:54AM

      by c0lo (156) Subscriber Badge on Tuesday May 30 2017, @01:54AM (#517415) Journal

      It's also:

      • a curse for "professional crackers" - once they crack the DRM, there days they can sell the cracked game are numbered, good luck making a profit the from it, the game will be available without DRM anyway once the game publisher learns about
      • an incentive for the cracking-artists (motivation for cracking just for the sake of art/recognition) - once they can demonstrate the crack is effective, they can contact the game developer and claim "the recognition" without taking the pain of distributing the cracked version (the care for anonymizing a notification is assumed less than the needed care of anonymizing the distribution of the cracked game).
      --
      https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
    • (Score: 0) by Anonymous Coward on Tuesday May 30 2017, @08:55AM

      by Anonymous Coward on Tuesday May 30 2017, @08:55AM (#517547)

      No, they just wanted to slow down the pirates a bit.

      Unfortunately for them, there are people like me who won't touch a game if it's got shit like that on the game. I see a game has external drm on top of steam, and I'll just flag it as "not interested" which will remind me to never buy the game in the future, even if the drm is removed.

      However they did the dumb thing of not being up front about the drm being on the steam version at first - they updated the store page later in the day or the following day to properly flag it. Essentially after someone warned people in the discussions that denuvo was on the game. (they had to find that out for themselves however.)

      So since I can't trust them to be honest and up front about the DRM they hide in their games, I've written down the publisher and developer in my little book that I check before buying a game. Names in that book mean I ignore them regardless of what they put out, on any platform. I've got enough games bought over the years that still sit unplayed to keep me occupied.

  • (Score: 0) by Anonymous Coward on Tuesday May 30 2017, @05:34AM

    by Anonymous Coward on Tuesday May 30 2017, @05:34AM (#517478)
    The game has the most perfect DRM ever!

    It's a shitty game that isn't worth the price of free.
  • (Score: 2) by KritonK on Tuesday May 30 2017, @06:48AM (6 children)

    by KritonK (465) on Tuesday May 30 2017, @06:48AM (#517500)

    Doesn't protection code boil down to

    if [some_test succeeds] then
            allow program to run
    else
            fail
    endif

    in one or more places?

    Someone proficient in using a disassembler and a binary editor can always change all occurrences of such code to

    if true then
            allow program to run
    else
            fail
    endif

    and bypass the protection, no matter how complicated the test is. This is one of the reasons why our company doesn't bother adding protection to our software, preferring to rely on offering software that our customers want, at a price that they are willing to pay.

    • (Score: 0) by Anonymous Coward on Tuesday May 30 2017, @08:03AM

      by Anonymous Coward on Tuesday May 30 2017, @08:03AM (#517522)

      Essentially yes, but it's not quite that simple. The tests and codepaths tend to be quite subtle and well hidden. It's almost like saying that particle accelerators are just smashing atoms together.

      Of course, if the software is good enough, it will eventually get cracked, and cracked version is usually the better one. DRM, by definition, only affects legal users after all, and strength of copy-protection schemes pretty well correlates with their invasiveness and amount of problems they create. I used to download no-CD cracks for all of my legally obtained games.

      I applaud your no-DRM policy. If only more software developers thought like that, who knows how many clock cycles and customer support hours could be saved...

    • (Score: 0) by Anonymous Coward on Tuesday May 30 2017, @08:11AM

      by Anonymous Coward on Tuesday May 30 2017, @08:11AM (#517525)

      In theory, yes. However, it will be very obfuscated.

    • (Score: 0) by Anonymous Coward on Tuesday May 30 2017, @08:18AM

      by Anonymous Coward on Tuesday May 30 2017, @08:18AM (#517529)

      More like

      if [get_some_key_from_somewhere] then
            decrypt_essential_code_for_running the game
      else
          fail
      endif

      in a *lot* of places.
      Of course the key in question needs to be distributed somehow with the game, so mathematically it's *always* crackable. Can be a lot of work though.

    • (Score: 3, Interesting) by Wootery on Tuesday May 30 2017, @08:37AM

      by Wootery (2341) on Tuesday May 30 2017, @08:37AM (#517539)

      They'll likely use other tricks too. Skype, for instance, tries to detect the presence of a debugger and will refuse to play ball if it thinks it's being analysed. It also tries to break the way debugger breakpoints work, encrypts the interesting parts of its native code, tries to detect changes being made to its native code, and fills its native code space with 'junk' to bury the needle in a haystack. Source. [oklabs.net]

      It's also possible to make use of a bytecode interpreter to make analysis more difficult. Somewhat related: the original Xbox made use of an interpreter in its boot process. The idea was that Microsoft knew that 'attackers' wouldn't easily be able to change the small amount of data held in the Xbox's relatively-secure (but very small) ROM, but would be able to change everything else, so their strategy was to write a small interpreter for a p-code which couldn't be used to do anything naughty, then write their boot code in the insecurely-stored p-code. Source. [mborgerson.com]

    • (Score: 3, Interesting) by TheRaven on Tuesday May 30 2017, @10:08AM

      by TheRaven (270) on Tuesday May 30 2017, @10:08AM (#517572) Journal
      There's a whole body of literature on code obfuscation that modern DRM schemes use. The Red Alert CD-key check, for example, let you install and start the game with an incorrect key, but would then make your base self destruct after a minute of gameplay. This is a fairly coarse example, but it's also possible to do things like multiply various numbers that determine difficulty by a variable that's influenced by the DRM check: the game 'works' fine, but for some reason the pirated version is a lot harder unless you find all of these checks and work out what the magic constants should be for the right checks. Cold code paths can be replaced by interpreters for a randomly generated bytecode and an implementation of the logic for that interpreter, along with DRM checks and an abort or simply a crash if they fail.
      --
      sudo mod me up
    • (Score: 1) by terrab0t on Tuesday May 30 2017, @10:48PM

      by terrab0t (4674) on Tuesday May 30 2017, @10:48PM (#517945)

      The biggest trick is making it very time consuming to verify if a crack is working. Don’t shut the program down immediately if a DRM check fails. Set a flag that slowly degrades parts of its functionality. The software will still be useless without the DRM, but it could take hours for a cracker to check each possible DRM switch.

      TheRaven gave a good example with Red Alert. For productive software, you can make important features fail after varying lengths of time and in convoluted chain reactions. Have it silently corrupt files on save, have editing options suddenly stop working, etc.

      The crackers will track down one or two of these, but they will give up trying to find and debug them all.

  • (Score: 0) by Anonymous Coward on Wednesday May 31 2017, @02:10AM

    by Anonymous Coward on Wednesday May 31 2017, @02:10AM (#518036)

    WTF are you ppl talking about, this game already has a P2P release that works on Day 1...this is nothing but a PR stunt. DRM is dead and has been since the day copy machines were invented (and no I don't care about your transparent red plastic strips!)...where's the GOG release? Time to pay the piper. *mic drop

  • (Score: 0) by Anonymous Coward on Wednesday May 31 2017, @03:08PM

    by Anonymous Coward on Wednesday May 31 2017, @03:08PM (#518317)

    Is this a play to catch perpetrators of past crackings by controlling the situation?

(1)