Quote:
Originally Posted by dgatwood
The way most folks attack DRM is to first run the app in a debugger, then at such a point as you believe the key exists in memory, dump the contents of the app's address space, throw away everything of known origin (the app binary itself, libraries, frameworks, and the contents of the book), and then go through the remaining data looking for a blob of data large enough to be a key.
|
I believe that the very high entropy of encryption keys makes them even easier to spot.