SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Security                                           eBooks




        Cryptographic Duplicate Detection

               For Access Management, Piracy
                    Protection, and More



                                Steven Davis

                                          steve@free2secure.com
Games, iGaming, and Gambling                    +1.650.278.7416
Security                                                 eBooks




        Protocols not Players or Computers


                               That’s all you see
                                     online




                                                steve@free2secure.com
Games, iGaming, and Gambling                          +1.650.278.7416
Security                                      eBooks


                   Traditional Identification &
        Authentication Methods are very weak
                 for verifying actual identities




 •   Name/Password can be shared & compromised
 •   ID/Key can be shared or compromised
 •   “Digital Fingerprints” can be duplicated


                                     steve@free2secure.com
Games, iGaming, and Gambling               +1.650.278.7416
Security                                  eBooks


• Powerful white list of
  good platforms
• Improve association
  of players with
  platforms
• Identifying problem
  platforms
• Can be a very
  powerful technique           Detecting
  to fight server piracy
  / ghost servers
                               Duplicate
• Support legitimate           Identities
  sharing and backups


                                 steve@free2secure.com
Games, iGaming, and Gambling           +1.650.278.7416
Security                                eBooks




    Core Idea
    Why not change identities AND keys at
     every session (or more frequently)?




                               steve@free2secure.com
Games, iGaming, and Gambling         +1.650.278.7416
Security                                                             eBooks

         Active Identity System - General Flow
                                                                                    tic
                                                                                 sta
   • Initialization                                                         be
                                                                       to
       – Done in a variety of ways                                ve
                                                                ha
       – Identity can even be verified retroactively
                                                             ot
   •   Verify Current Identity/Key Pair                    sn
                                                     doe
   •   Update Identity/Key Pair                    e
   •   Verify Update                            alu
                                         tit yV
   •   Continue Operations            en
                                    Id
   • OPTION - use “rolling update” to operate smoothly
     during identity changes
             • add an “A” or “B” Flag to messages
             • Send “rollover” command message

                                                       steve@free2secure.com
Games, iGaming, and Gambling                                 +1.650.278.7416
Security                                                                   eBooks

                    Server-Push Identity
 Player posts ID to server                            ID(x)
 Server returns Challenge Phrase                      Challenge(IDx))
 Player posts encrypted Challenge Phrase              ID(x),E(Key(x),Challenge(IDx))
 Server validates Response
 Server creates updated ID & Key
 Server sends updated ID & Key encrypted in old key   E(Key(x+1),ID(x+1),SessionID)
 Player decrypts new ID & Key
 Player sends validation message to Server            SessionID,E(Key(x+1),SessionID)


    • Client gets new ID/Key pair from server
    • Server knows underlying identity of client
    • If duplicate made of client info, server can create an “Identity Fork”
      or take other action
    • You know a duplicate has been made, not which copy is a duplicate
    • Can be done with symmetric keys or public (asymmetric) key
      systems

                                                               steve@free2secure.com
Games, iGaming, and Gambling                                         +1.650.278.7416
Security                                                                        eBooks

             Collaborative Identity Generation 1
 Player creates new ID(cx+1), Transform of new ID, and Challenge1
 Player creates new DH random z and computes b z mod p
 Player posts Challenge Phrase to server
           ID(x),E(Key(x),T(ID(cx+1)), b z mod p,Challenge1)
 Server decrypts Challenge Phrase
 Server creates new ID(sx+1), Transform of new ID, and Challenge2
 Server creates new DH random y and computes b y mod p
 * Server creates new DH key              Key(x+1) = (b z ) y mod p
 Server posts Challenge Phrase to Client
           ID(x),E(Key(x),T(ID(sx+1)), b y mod p,Challenge1, Challenge2, H(Key(x+1))
 Client decrypts Challenge Phrase and validates Challenge1


 • Sample using Diffie-Hellman style key generation
 • Could easily be adapted to other public key algorithms


                                                                    steve@free2secure.com
Games, iGaming, and Gambling                                              +1.650.278.7416
Security                                                                         eBooks

             Collaborative Identity Generation 2
 (from previous page) Client decrypts Challenge Phrase and validates Challenge1
 * Client creates new DH key             Key(x+1) = (b z ) y mod p
 Client validates new DH key with received hash
 Client sends new ID(cx+1) to Server with hash of new Key and Challenge2
            ID(x),E(Key(x),ID(cx+1),H(Key(x+1)),Challenge2)
 Server validates new ID against previously received Transform and validates Key(x+1) hash
 * Server computes new ID                ID(x+1) = ID(cx+1)+ ID(sx+1)
 Server sends new ID contribution to Client
            ID(x),E(Key(x),ID(sx+1)
 * Client computes new ID                ID(x+1) = ID(cx+1)+ ID(sx+1)
 Client and sever use new ID(x+1), Key(x+1) pair


 • Active Identity System is really a temporary pairwise identity
   with a remote entity
 • Does not need to be client-server, could be peer-to-peer

                                                                     steve@free2secure.com
Games, iGaming, and Gambling                                               +1.650.278.7416
Security                                                 eBooks

 Active Identity is Part of an Overall Identity &
 Access Management Solution

                             To
                                Str
                                    en
                                 an gth
                                     d O en
                                        nli Pla
                                           ne tfo
                                             Se rm
     •  Digital Fingerprints                    cu i d
                                                  rity en
     •  User Name/Passwords                              tity
     •  Security Tokens
     • IP Address
     • Platform IDs
     • Active ID

                                                steve@free2secure.com
Games, iGaming, and Gambling                          +1.650.278.7416
Security                                                  eBooks


   Fighting Server
   Piracy


  • Client can detect server duplicates as server won’t have
    current identity/key pair
     – Can prevent connection to pirate server
  • Even if real server identity/key database gets
    compromised, clients will rapidly rekey to new
    identity/key pairs
  • Can also be used for traditional computer piracy
    detection system
                                                 steve@free2secure.com
Games, iGaming, and Gambling                           +1.650.278.7416
Security                                                             eBooks




   What next?
   • Don’t give up!

   • More security presentations at:
     http://free2secure.com/

   • Check out my book “Protecting Games”
       – Additional information at http://playnoevil.com/


   • You can “win” the security game
                                                            steve@free2secure.com
Games, iGaming, and Gambling                                      +1.650.278.7416
Security                                                                  eBooks

      About Me
  •   Steven Davis
       – 25+ Years of Security Expertise
           • Worked on everything from online
             games and satellite TV to Nuclear
             Command and Control and military
             communications
           • http://www.linkedin.com/in/playnoevil
       – Author, “Protecting Games”


  •   Why Free2Secure?
       – Security is too expensive and isn’t working. There has to be a better way.
         I’m exploring these issues for IT security, ebooks, games, and whatever
         else strikes my fancy at http://free2secure.com/ .
       – Join me there, ask questions, challenge assumptions, let’s make things
         better.

                                                               steve@free2secure.com
Games, iGaming, and Gambling                                         +1.650.278.7416

Weitere ähnliche Inhalte

Kürzlich hochgeladen

What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 

Kürzlich hochgeladen (20)

Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 

Empfohlen

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 

Empfohlen (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

Piracy Protection and Online Identity Security with Digital Duplicate Detection

  • 1. Security eBooks Cryptographic Duplicate Detection For Access Management, Piracy Protection, and More Steven Davis steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 2. Security eBooks Protocols not Players or Computers That’s all you see online steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 3. Security eBooks Traditional Identification & Authentication Methods are very weak for verifying actual identities • Name/Password can be shared & compromised • ID/Key can be shared or compromised • “Digital Fingerprints” can be duplicated steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 4. Security eBooks • Powerful white list of good platforms • Improve association of players with platforms • Identifying problem platforms • Can be a very powerful technique Detecting to fight server piracy / ghost servers Duplicate • Support legitimate Identities sharing and backups steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 5. Security eBooks Core Idea Why not change identities AND keys at every session (or more frequently)? steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 6. Security eBooks Active Identity System - General Flow tic sta • Initialization be to – Done in a variety of ways ve ha – Identity can even be verified retroactively ot • Verify Current Identity/Key Pair sn doe • Update Identity/Key Pair e • Verify Update alu tit yV • Continue Operations en Id • OPTION - use “rolling update” to operate smoothly during identity changes • add an “A” or “B” Flag to messages • Send “rollover” command message steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 7. Security eBooks Server-Push Identity Player posts ID to server ID(x) Server returns Challenge Phrase Challenge(IDx)) Player posts encrypted Challenge Phrase ID(x),E(Key(x),Challenge(IDx)) Server validates Response Server creates updated ID & Key Server sends updated ID & Key encrypted in old key E(Key(x+1),ID(x+1),SessionID) Player decrypts new ID & Key Player sends validation message to Server SessionID,E(Key(x+1),SessionID) • Client gets new ID/Key pair from server • Server knows underlying identity of client • If duplicate made of client info, server can create an “Identity Fork” or take other action • You know a duplicate has been made, not which copy is a duplicate • Can be done with symmetric keys or public (asymmetric) key systems steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 8. Security eBooks Collaborative Identity Generation 1 Player creates new ID(cx+1), Transform of new ID, and Challenge1 Player creates new DH random z and computes b z mod p Player posts Challenge Phrase to server ID(x),E(Key(x),T(ID(cx+1)), b z mod p,Challenge1) Server decrypts Challenge Phrase Server creates new ID(sx+1), Transform of new ID, and Challenge2 Server creates new DH random y and computes b y mod p * Server creates new DH key Key(x+1) = (b z ) y mod p Server posts Challenge Phrase to Client ID(x),E(Key(x),T(ID(sx+1)), b y mod p,Challenge1, Challenge2, H(Key(x+1)) Client decrypts Challenge Phrase and validates Challenge1 • Sample using Diffie-Hellman style key generation • Could easily be adapted to other public key algorithms steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 9. Security eBooks Collaborative Identity Generation 2 (from previous page) Client decrypts Challenge Phrase and validates Challenge1 * Client creates new DH key Key(x+1) = (b z ) y mod p Client validates new DH key with received hash Client sends new ID(cx+1) to Server with hash of new Key and Challenge2 ID(x),E(Key(x),ID(cx+1),H(Key(x+1)),Challenge2) Server validates new ID against previously received Transform and validates Key(x+1) hash * Server computes new ID ID(x+1) = ID(cx+1)+ ID(sx+1) Server sends new ID contribution to Client ID(x),E(Key(x),ID(sx+1) * Client computes new ID ID(x+1) = ID(cx+1)+ ID(sx+1) Client and sever use new ID(x+1), Key(x+1) pair • Active Identity System is really a temporary pairwise identity with a remote entity • Does not need to be client-server, could be peer-to-peer steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 10. Security eBooks Active Identity is Part of an Overall Identity & Access Management Solution To Str en an gth d O en nli Pla ne tfo Se rm • Digital Fingerprints cu i d rity en • User Name/Passwords tity • Security Tokens • IP Address • Platform IDs • Active ID steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 11. Security eBooks Fighting Server Piracy • Client can detect server duplicates as server won’t have current identity/key pair – Can prevent connection to pirate server • Even if real server identity/key database gets compromised, clients will rapidly rekey to new identity/key pairs • Can also be used for traditional computer piracy detection system steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 12. Security eBooks What next? • Don’t give up! • More security presentations at: http://free2secure.com/ • Check out my book “Protecting Games” – Additional information at http://playnoevil.com/ • You can “win” the security game steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 13. Security eBooks About Me • Steven Davis – 25+ Years of Security Expertise • Worked on everything from online games and satellite TV to Nuclear Command and Control and military communications • http://www.linkedin.com/in/playnoevil – Author, “Protecting Games” • Why Free2Secure? – Security is too expensive and isn’t working. There has to be a better way. I’m exploring these issues for IT security, ebooks, games, and whatever else strikes my fancy at http://free2secure.com/ . – Join me there, ask questions, challenge assumptions, let’s make things better. steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416

Hinweis der Redaktion

  1. http://paintingperceptions.com/videos/the-http://www.paintingperceptions.com/wp-content/uploads/2011/03/monoDamien.jpg http http://images3.wikia.nocookie.net/__cb20061109120654/uncyclopedia/images/1/12/MonaLisa.jpg http://1.bp.blogspot.com/-fnnRDjPhs8I/Ts4LO4RifQI/AAAAAAAACkE/FICafzhG68s/s1600/bin+laden+mona.jpg http://www.freakingnews.com/pictures/21000/Mona-Lisa-Jack-Sparrow--21109.jpg http://www.deviantart.com/download/83657642/Lego_Mona_Lisa_by_Eeveeisgerman.jpg http://www.artyfactory.com/pop_art_portraits/images/mona_lisa/mona_lisa_group_3.jpg http://cloud.kapilsoni.com/2009/11/What-Mona-Lisa-Looks-Like-002.jpg
  2. http://file.cdn.global.netmarble.com/img/Forum/40/2011/10/05/20111005134703.jpg