frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Open in hackernews

Ask HN: How do I prevent execs from obsessing over copy-protection?

5•bad_boomerang•6h ago
Throwaway for obvious reasons. I've just begun a short term dev contract and I'm noticing a bit of a bump ahead that I worry might impede our ability to deliver the product.

The org sells to a very niche luxury market and distributes a native application at a high price. The execs at this company are extremely perturbed by the appearance of cracks of the software that appear sometime after every release. The issue is that our present architecture as a native application means the attacker already has root and we cannot protect any key, there are also domain specific reasons why some users will always need to be remote at some point. While I want to encourage the org to eventually move to a client-server architecture we could protect, the need to provide the remote copies means all we can do is create puzzle boxes via security by obscurity, that are cheaper to unlock for an attacker (in terms of their likely hourly rate) than for us to create.

I believe they are over-reacting to the emergence of these cracks by pushing the dev team to introduce more checks into the software and thereby harming productivity and potentially even stability of the software while also failing to solve the issue. To give you an example of my fear; I was talking to one of our devs recently about a dependency issue where some extra license checks had been baked into the UI and I was encouraging better composition to extract these sorts of checks to a specific layer instead. They replied "but if we put all the license checks in the same place, won't that make it easier to crack?".

I appreciate this is probably a red flag and I should run but I believe myself to be a convincing person and I would like to try. They are a little old-school, so I feel like a gentle approach is necessary. For the most part I am wanting to attempt to reframe the issue from a "tech problem" to a "social problem" and focus less on adding more security by obscurity and more on tracking down where the leaks are coming from where consequences can be enforced via license agreements.

So I appeal to you all to help me with this endeavour. I imagine some of you have been in this sort of situation before, and have experience I could draw from, or might have knowledge of various sources I can use. The one that springs to mind for me is the issues that big online gaming companies have with aim-bots or other cheats in markets where the value of the hack is close to the zero and the resources of the engineering department trying to defend are high; to demonstrate the futility of the approach. However I worry a little, that given the old-schoolness at play that gaming might not be an example they will be receptive to.

Conversely, if anyone has any counterpoints or suggestions about low hanging fruit, outside of simple obfuscation and/or hardware dongles, this would also be appreciated, as it might help if I can also suggest something from their angle that beats the typical curve of severely diminishing returns.

Comments

v5v3•3h ago
>Ive just begun a short term dev contract

Who hired you? Have you spoken to that person?

>I was talking to one of our devs recently

He or she isn't your dev, they are your clients. You are a temp.

bad_boomerang•2h ago
> Who hired you? Have you spoken to that person?

Its a little awkward, the chain of command is a little ad-hoc. So lets say the person who hired me is one of these execs. They were quite excited to hear about my knowledge of security which was dampened when they realised I was more talking about auth and securing endpoints as opposed to smth like DRM.

> He or she isn't your dev, they are your clients. You are a temp.

that particular detail is intentional noise. So sadly that advice doesn't apply.

Like I said, the attitude is so pervasive that I worry that it will interfere with the successful delivery of the product. That part, regardless of the noise remains pertinent.

tacostakohashi•6m ago
If you have a "short term dev contract", this is not your problem.

Let the owners, board of directors, management, and employees figure it out.

al_borland•5m ago
It's important to remember the context of your employment... "a short term dev contact." You may have great ideas for solving all their problems, but if you have a short term contract, and then are gone, and you started them on a long journey to rearchitect their entire app, and then the existing employees have to support it. That's not a great situation. If you're hoping that this effort will get you a full time gig, is this a place you want to work long-term having seen what you've seen?

More to your question, if you need to sell this to execs, you need to talk in terms of dollars. How much is this change going to cost? How much will it make or save them? What are the risks to the business if it isn't done? The more abstract or hypothetical the risk or financials, the less likely they are to buy what you're selling.

Sorry I can't give any specific suggestions, as I'm having trouble conceptualizing what the product is. What is this key you need to protect? A product license key that they want to validate without an internet connection? Is that the goal?

Show HN: Built email parsing for booking confirmations for my travel app – Aruko

https://www.aruko.world/
1•ankit21j•1m ago•0 comments

Autopoietic Networks (a few more examples)

https://gbragafibra.github.io/2025/05/27/autopoietic_nets2.html
1•Fibra•6m ago•0 comments

Trump's tax-and-spending bill passes Congress in major win for president

https://www.theguardian.com/us-news/2025/jul/03/trump-tax-bill-passes-congress
1•leotravis10•8m ago•0 comments

Building a fast website with the MASH stack in Rust

https://emschwartz.me/building-a-fast-website-with-the-mash-stack-in-rust/
1•gametorch•8m ago•0 comments

There's No Undo Button for Our Fallen Democracy

https://kottke.org/25/07/theres-no-undo-button-for-our-fallen-democracy
1•leotravis10•8m ago•0 comments

Guy accused of working at 4 YC startups at the same time

https://twitter.com/Suhail/status/1940287384131969067
1•v5v3•11m ago•2 comments

Printcrime

https://craphound.com/stories/2006/01/12/printcrime/
2•foxfired•11m ago•0 comments

The Scam of Age Verification

https://pornbiz.com/post/17/the_scam_of_age_verification
1•Lucasoato•13m ago•0 comments

Ocean-2: wave based power generation [video]

https://www.youtube.com/watch?v=Q7Pmgq2JKbI
1•clacker-o-matic•13m ago•1 comments

Show HN: Listopia Open Source AI Powered List Manager

https://medium.com/@spaquet/saas-is-dead-how-i-built-listopia-with-ai-to-replace-clunky-task-managers-fd09e0c15111
1•spaquet•15m ago•0 comments

Active CPU pricing for Fluid compute

https://vercel.com/blog/introducing-active-cpu-pricing-for-fluid-compute
2•raybb•16m ago•1 comments

Unreal Engine 5.6 Release Notes

https://dev.epicgames.com/documentation/en-us/unreal-engine/unreal-engine-5-6-release-notes#runtimevirtualtextures(rvt)
1•ksec•18m ago•0 comments

CO2 sequestration through accelerated weathering of limestone on ships

https://www.science.org/doi/10.1126/sciadv.adr7250
2•PaulHoule•19m ago•1 comments

Provider of covert surveillance app spills passwords for 62,000 users

https://arstechnica.com/security/2025/07/provider-of-covert-surveillance-app-spills-passwords-for-62000-users/
2•gametorch•20m ago•0 comments

The curious case of the British F35B jet stuck in India

https://www.bbc.com/news/articles/cy8gj2nlnywo
3•lsllc•21m ago•0 comments

What Are MCP Servers?

https://fly.io/blog/mcps-everywhere/
1•russellthehippo•22m ago•2 comments

Wordserpent

https://www.wordserpent.online
1•tiantiankaixin•25m ago•0 comments

DeepSWE: Training an Open-Sourced Coding Agent by Scaling RL

https://pretty-radio-b75.notion.site/DeepSWE-Training-a-Fully-Open-sourced-State-of-the-Art-Coding-Agent-by-Scaling-RL-22281902c1468193aabbe9a8c59bbe33
1•sijuntan•28m ago•1 comments

Los Alamos Scientist's Insights on the GBU-57 Ordnance Penetrator

https://www.twz.com/nuclear/los-alamos-scientists-insights-on-the-gbu-57-massive-ordnance-penetrator
1•howard941•30m ago•0 comments

How to write Rust in the kernel: part 1

https://lwn.net/Articles/1024202/
2•signa11•31m ago•1 comments

Health effects of processed meat, sugar-sweetened beverages and trans fat

https://www.nature.com/articles/s41591-025-03775-8
2•ckcheng•31m ago•0 comments

Data Science Weekly – Issue 606

https://datascienceweekly.substack.com/p/data-science-weekly-issue-606
1•sebg•34m ago•0 comments

Why Are Liberal Professors More Conservative on Campus?

https://dailynous.com/2025/06/17/why-are-liberal-professors-more-conservative-on-campus-guest-post/
1•bikenaga•36m ago•0 comments

Jaguar Sales Drop by 97 Percent in Europe, Which Is Allegedly Fine

https://www.thetruthaboutcars.com/cars/news-blog/jaguar-sales-drop-by-97-percent-in-europe-which-is-allegedly-fine-45129343
2•RickJWagner•38m ago•0 comments

Uncommon Uses of Python in Commonly Used Libraries (2022)

https://eugeneyan.com/writing/uncommon-python/
1•sebg•38m ago•0 comments

What to do if your SSRI is making hot days even worse

https://www.washingtonpost.com/wellness/2025/07/02/ssri-heat-intolerance/
2•bookofjoe•39m ago•1 comments

My love/hate relationship with Unix-likes

https://www.unmappedstack.dev/blogs/love-hate-unix-likes
2•UnmappedStack•39m ago•0 comments

Marketing for maintainers: Promote your project to users and contributors (2022)

https://github.blog/open-source/maintainers/marketing-for-maintainers-how-to-promote-your-project-to-both-users-and-contributors/
1•sebg•42m ago•0 comments

Show HN: Turn any webpage/video into a summary, podcast, or mindmap

https://unrav.io
1•rriley•51m ago•0 comments

Stabilizing Naked Functions

https://blog.rust-lang.org/2025/07/03/stabilizing-naked-functions/
1•exiguus•51m ago•0 comments