CodePudding user response:
While the priest climbs a post, the devil climbs, while the priest climbs a post, the copyright protection, is an enduring problemCodePudding user response:
Illegal crack is a cancer that can restrain policiesCodePudding user response:
In terms of the current environment, still need to use to protect themselves, not by policy of what, after all, piracy is go to play a gun, forensics is so difficultCodePudding user response:
It is ok that soft encryption, self protectionCodePudding user response:
Brother, you are out, now don't say soft encryption, is some hard encryption scheme design is not good, also will not safe?CodePudding user response:
Would you please explain, what is the difference between soft and hard encryption?CodePudding user response:
, of course, there's a difference, the difference between the point and, security, soft encryption is simply software itself did some operation, control of equipment, hardware encryption is extra hardware interact with the master, such as encryption chip,CodePudding user response:
Encryption chip, I know, to data protection and protection of the program, the domestic l.. The k... t.... Do you canCodePudding user response:
Really, how to ensure the security of it, said the detailsCodePudding user response:
With encryption chip, with a good crack cost increase greatlyCodePudding user response:
When it comes to security, that it's a long story, that from the point of viewCodePudding user response:
When it comes to security, that there's a speaking, from the Angle of development!CodePudding user response:
Please carefully about, very grateful!CodePudding user response:
Encryption for chip package, alone several kinds, such as id authentication, key authentication, data protection, procedure protection are differentCodePudding user response:
Encryption for chip package, alone several kinds, such as id authentication, key authentication, data protection, procedure protection are differentCodePudding user response:
How these relations, which the highest security level?CodePudding user response:
Authentication, general certification point on the device side, still rely on security equipment end, so relatively poorCodePudding user response:
What the authentication?CodePudding user response:
I said once, protective security program is better, because you like LKT this kind of chip, is can support programming, similar to MCU, but means less debugging test development process, so security is betterCodePudding user response:
Whether the development difficulties, how to ensure securityCodePudding user response:
Looks good, from the point of personal understanding, anti-piracy and words to better protection combined closely, and chip is no problem, directly in the MCU to make out that plan is not perfectCodePudding user response:
Well, it seems that I know is really does protection safetyCodePudding user response:
Upstairs or have really understand the encryption chip, good product also need good package to protect it