Page 1 of 2 12 LastLast
Showing results 1 to 10 of 11

Thread: Emulation and safedisc key

  1. #1
    New User
    Join Date
    28.11.2003
    Posts
    7

    Default Emulation and safedisc key

    how are daemon-tools able to emulate a bad copy of a safedisc-protected cd? i always thought, the bad sectors contained a key that is necessary to decrypt the encrypted executable file of a game? how do the daemon-tools know this key?

  2. #2

    Default

    Bad sectors are just for cd-check (and to slow down the backup process) - they can't store anything by definition, 'cause they're unreadable.
    Everybody be cool! You, be cool!
    They'll keep fighting! And they'll win!

  3. #3
    New User
    Join Date
    28.11.2003
    Posts
    7

    Default

    but somewhere i read that the key is calculated from the position of these bad sectors. if that isnґt true, how and where is that key stored?

  4. #4

    Default

    The decryption of the SafeDisc2 protected games' exe is done via the weak sector contents, but the weak sectors are "good", not defect/bad.
    Everybody be cool! You, be cool!
    They'll keep fighting! And they'll win!

  5. #5
    New User
    Join Date
    28.11.2003
    Posts
    7

    Default

    sorry, obviously there was a misunderstanding: i was talking about safedisc 1. i know that sd 2 works with weak sectors, but afaik sd 1 relies upon bad sectors (wrong ecc)?
    by the way, thank you for answering so quickly.....

  6. #6

    Default

    SafeDisc1 was created in a time only few writers were able to write RAW sectors (at least before SAO-RAW write mode was used)
    so backups of SafeDisc created with a so-called cooked write mode made the bad sectors good - so no errors were reported and the protection knew it wasn't the original cd - that's it but then almost all newer writers were able to write DAO-RAW96 and that was SafeDisc1's dead, also old SecuROM's dead (sub-channel based).
    Everybody be cool! You, be cool!
    They'll keep fighting! And they'll win!

  7. #7
    New User
    Join Date
    28.11.2003
    Posts
    7

    Default

    ok about the raw mode (but you need raw-96 only for correct writing of all 8 subchannel-bits, not needed for sd).
    but sd1 definitely encrypts the original executable file of a game, which is then called xxx.icd. the xxx.exe file is only the safedisc loader, which decrypts the xxx.icd using the tea algorithm and a key stored on the cd. and if as i already mentioned, i thought this key is calculated from the position of the bad sectors. if you copy in raw mode, the bad sectors are present on your copy, so also the key is. but if you copy in cooked mode (corrected ecc)
    the key is gone. so how does emulation work, how can the xxx.icd file be decrypted when the needed key is not present?

  8. #8

    Default

    Well, some secrets should stay secret :mrgreen:
    otherwise we could write a letter to Macrovision :roll:
    Everybody be cool! You, be cool!
    They'll keep fighting! And they'll win!

  9. #9
    New User
    Join Date
    28.11.2003
    Posts
    7

    Default

    well, of course i understand that. the only thing i want to know is: do daemon-tools store a key for every game / every version of sd? this is the only reasonable explanation, since there is no key on the copied cd.
    and concerning macrovision: you can bet they know a lot about that, guess they spend a lot of time analyzing daemon-tools. hopefully without success :mrgreen:

  10. #10

    Default

    do daemon-tools store a key for every game / every version of sd?
    No. :mrgreen:
    Everybody be cool! You, be cool!
    They'll keep fighting! And they'll win!

Page 1 of 2 12 LastLast

Bookmarks

Posting Rules

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •