Tell me, how is the protection of paid libraries against piracy?

For example, I bought some kind of library and what prevents me from merging it into the Internet?

Closed due to the fact that it is necessary to reformulate the question so that it is possible to give an objectively correct answer by the participants aleksandr barakin , Harry , Alex , user194374, pavel 4 Dec '16 at 16:39 .

The question gives rise to endless debates and discussions based not on knowledge, but on opinions. To get an answer, rephrase your question so that it can be given an unambiguously correct answer, or delete the question altogether. If the question can be reformulated according to the rules set out in the certificate , edit it .

  • For example, what's stopping you from entering someone else's apartment? :) That's about the same ... - Harry
  • Very often not technical, but administrative methods are used. If using a library without a license is prohibited by law, few will want to earn a large fine, or even go to jail if a violation is revealed. - VladD

1 answer 1

The usual method of protection is to register the use of a specific workstation (hardware) in a particular software environment. Based on some identifying features, a single system identifier is formed from them, and a key is created that corresponds to this particular set of features. When transferring to another system, a single identifier will turn out different, and will not match the key. A key can be either a pure data key or a hardware key. The simplest version of this method is the use of a serial number (as it was, for example, in Windows), i.e. registration of legitimacy is simply by the fact that the operator knows the registration key.

Or a hardware key is used that performs some functions to bring the library to a working state (for example, decrypt some blocks of code and / or data) without being tied to the equipment — then the library works on the workplace where the key is installed.