Support

Anti-Piracy

Safeguarding the DRM of software applications yields multifaceted benefits, foremost among them being revenue preservation. By thwarting unauthorized access and piracy, developers and publishers can safeguard their revenue streams, ensuring that their intellectual property generates the deserved returns on investment. Additionally, hardening store license management against piracy safeguards the integrity of the brand, upholding its reputation and prestige within the relevant communities. Furthermore, robust DRM measures enhance user trust and confidence by assuring them of a secure and authentic experience, thereby fostering long‑term customer loyalty. Beyond financial considerations, anti‑piracy tech bolsters regulatory compliance, ensuring adherence to copyright laws and industry standards, thus mitigating legal risks and liabilities. Moreover, it enables developers to maintain control over software distribution channels, optimizing market reach and maximizing the potential for commercial success. Ultimately, DRM protection serves as a cornerstone for sustainable growth, innovation and competitiveness in the dynamic landscape of the software industry.

No, our solution does not install any software. There are no drivers or services installed as part of our solution. Our solution only operates within the game process in user mode.

Our protection only uploads anonymized system identifiers along with ownership information (usually user ID in the store and entitlement info related to the protected software), occurring only once during the initial launch of the software or after major system changes.

File writing is minimal, occurring only once during the initial launch of the software or after major system changes, where just a single tiny file is deposited onto the hard drive, to 1 or 2 locations depending on user rights. That's all. The locations are %localappdata%\DRM and %programdata%\DRM.

Our solution protects about 10 game functions. It doesn't detect modifications in other game functions within the protected executable or modifications in any other file. Enjoy modding!

Yes, an internet connection is required for the initial activation process or after major system updates. During activation, a unique activation token needs to be downloaded and installed, ensuring secure and authenticated access to the software. Connections are outgoing on port 443 (https). This process occurs seamlessly in the background, minimizing disruption to the user experience. Once activation is complete, you can subsequently start the activated software without requiring an internet connection, enabling offline usage convenience.

We specialize in protecting 64‑bit Windows portable executables, encompassing both .exe and .dll files. Our solution is tailored to ensure robust protection for a wide range of software applications, offering comprehensive security measures to safeguard executable files from unauthorized access and piracy threats on the Windows platform.

The duration of protection against piracy can vary depending on various factors and the specific context of its implementation. To ascertain the effectiveness of our solution in safeguarding against piracy, we propose collaborating and evaluating its performance together, ensuring that it meets your unique requirements and expectations.

Our protection solution is applied post‑build, eliminating the need for any source‑code changes. The implementation process typically involves running a standalone executable with a brief command‑line input and checking the exit code. In some cases, a compiler flag may need to be adjusted. This straightforward integration process can usually be completed within an hour, excluding testing.

The duration for protecting your executable within your build script typically ranges between 20 and 60 minutes, contingent upon factors such as the selected level of protection and enabled features. This timeframe accommodates the comprehensive integration of encryption, obfuscation and other security measures tailored to meet your specific requirements, ensuring robust protection against unauthorized access and piracy threats.

Pirates possess automated tools and store emulators, enabling them to crack unprotected DRM swiftly, often in a matter of minutes. In fact, the process of testing whether the crack functions properly often consumes more time than the actual cracking process itself. With readily available tools and techniques, pirates can exploit vulnerabilities in unprotected DRM systems with alarming efficiency, underscoring the critical importance of implementing robust anti‑piracy measures.

Yes, we can protect DLCs with the same level of protection as base games. However, when protecting both the base game and a DLC simultaneously, the protection process may introduce slight delays in launching the game, with a few seconds added for each protected DLC. Therefore, we recommend not protecting more than two DLCs at once to optimize performance and minimize any potential impact on the user experience.

Yes, our protection is fully compatible with Valve Steam Deck, ensuring seamless integration and robust security for gaming experiences on this platform. Additionally, our solution is also compatible with Linux Wine. By selectively limiting the execution of protected functions to startup and loading functions, we ensure no impact on battery consumption during gameplay.

No, both x64 assembly code mutation and virtualization are handled by our own obfuscator.

Anti-Leak

Our anti‑leak solution periodically sends reports with authorized launch data, giving you complete visibility into who launched your protected software, from where and when. Optionally, it can also enforce checks: the software can be configured to run only if launched by pre‑configured store user IDs or from specified IP address ranges (or both). If someone attempts to launch from an unauthorized user ID or IP address, the system blocks the launch and sends notifications with detailed information about the attempted leak (time, IP, user, etc.). Ownership verification can still work via a supported store, activation key, or via the Okta flow. Unlike anti‑piracy, anti‑leak–protected software always requires an internet connection to launch.

No, the anti‑leak solution is bundled together with anti‑piracy protection. This ensures protection against tampering or removal of the leak protection. If your software isn’t distributed through a store, we can alternatively use activation‑keys via our DRM.

Yes, an internet connection is required at all times to launch software protected by anti‑leak, because the system verifies the public IP address and store user ID on every launch. If you use a VPN or corporate network, the software may still launch provided the connection matches the configured allowed IDs or IP ranges.

Event Security

Our solution operates seamlessly by executing a standalone executable. It actively monitors the configured application, promptly detecting when it enters fullscreen mode. Once detected, users are effectively restricted from utilizing keyboard shortcuts to exit the software. In instances where users manage to circumvent this restriction, such as by quitting the software through a menu or adjusting resolution settings, our system swiftly locks the Windows session, preventing access to the desktop. This comprehensive approach ensures that users are confined to using only the designated software, thereby mitigating the risk of data leaks and cheating.