Defeating a 40-year-old copy protection dongle

Simplicity of the protection & reversing approach

  • Many commenters note the dongle scheme (fixed value over LPT) is crude but “good enough” for a 1980s business audience.
  • Several stress that the hard part of cracking is locating the check; once found, bypassing it is often a one‑instruction change (JE/JNE→JMP or flipping a single bit in a conditional jump).
  • One commenter criticizes the assumption that “no inputs = constant result”, pointing out you could have rolling codes or stateful verification, but agrees it happened to be simple here.

Anecdotes from the copy‑protection era

  • Numerous stories of defeating protections by:
    • Patching conditional branches, NOP‑ing calls, or editing values in hex.
    • Exploiting bad key‑validation designs (e.g., valid codes left in memory or registry).
    • Bypassing hardware checks on damaged floppy sectors or “laser protected” disks.
  • People recall feeling like “hackers” as teens using SoftICE or Borland debuggers to remove nags and limits.

Why dongles were/are used and why they declined

  • Historically common in expensive CAD/engineering, DAWs, and industrial software; less so in games, which favored media/manual-based schemes.
  • Practical pain points: limited ports, daisy‑chaining “dongle snakes”, frequent breakage/loss, support overhead.
  • Commenters note that reversing dongle checks is usually no harder than bypassing software-only licensing, so protection gains are modest.

Modern licensing, SaaS, and business incentives

  • A civil/structural software developer describes still using dongles and seeing cracked copies sold online; argues that without protection, revenue and hence viability suffer.
  • Heated debate over SaaS vs perpetual licenses:
    • Critics say SaaS exploits users in stable domains where “if it isn’t broken, don’t fix it” applies, and that bug fixes should not be paywalled.
    • Defenders argue recurring revenue is necessary because platforms change, dependencies charge annually, and customers expect ongoing fixes and support.

Legacy and industrial contexts

  • Several point out that old OSs (Win95, Win98, Windows 2000, even PDP‑11s) and dongled compilers still run mission‑critical or regulated systems (medical, nuclear, industrial automation).
  • Air‑gapped or high‑sensitivity environments often prefer physical or local licensing over cloud checks; outages in license servers are seen as a serious operational risk.

Legality, preservation, and ethics

  • Multiple comments note that defeating the protection is likely illegal under DMCA 1201, despite the age of the software; there is no “very old” exemption in the US.
  • Others emphasize European allowances for reverse engineering for compatibility (not fully detailed).
  • Some worry about publishing cracks if any vendor or successor might still monetize or enforce IP; others argue obscurity and lack of footprint suggest the software is effectively abandoned.

Hardware curiosity & emulation

  • Hardware‑oriented readers wish the dongle had been opened; speculate it may be simple logic, EEPROM, or even just resistors.
  • There is mention of dongle emulators and using dumps to keep legacy Win9x/DOS software running in modern environments.
  • Several compare this work to “software archaeology,” valuing it as documentation and preservation of a vanished era of protection schemes.