SlideShare une entreprise Scribd logo
1  sur  13
Security                                           eBooks




        Cryptographic Duplicate Detection

               For Access Management, Piracy
                    Protection, and More



                                Steven Davis

                                          steve@free2secure.com
Games, iGaming, and Gambling                    +1.650.278.7416
Security                                                 eBooks




        Protocols not Players or Computers


                               That’s all you see
                                     online




                                                steve@free2secure.com
Games, iGaming, and Gambling                          +1.650.278.7416
Security                                      eBooks


                   Traditional Identification &
        Authentication Methods are very weak
                 for verifying actual identities




 •   Name/Password can be shared & compromised
 •   ID/Key can be shared or compromised
 •   “Digital Fingerprints” can be duplicated


                                     steve@free2secure.com
Games, iGaming, and Gambling               +1.650.278.7416
Security                                  eBooks


• Powerful white list of
  good platforms
• Improve association
  of players with
  platforms
• Identifying problem
  platforms
• Can be a very
  powerful technique           Detecting
  to fight server piracy
  / ghost servers
                               Duplicate
• Support legitimate           Identities
  sharing and backups


                                 steve@free2secure.com
Games, iGaming, and Gambling           +1.650.278.7416
Security                                eBooks




    Core Idea
    Why not change identities AND keys at
     every session (or more frequently)?




                               steve@free2secure.com
Games, iGaming, and Gambling         +1.650.278.7416
Security                                                             eBooks

         Active Identity System - General Flow
                                                                                    tic
                                                                                 sta
   • Initialization                                                         be
                                                                       to
       – Done in a variety of ways                                ve
                                                                ha
       – Identity can even be verified retroactively
                                                             ot
   •   Verify Current Identity/Key Pair                    sn
                                                     doe
   •   Update Identity/Key Pair                    e
   •   Verify Update                            alu
                                         tit yV
   •   Continue Operations            en
                                    Id
   • OPTION - use “rolling update” to operate smoothly
     during identity changes
             • add an “A” or “B” Flag to messages
             • Send “rollover” command message

                                                       steve@free2secure.com
Games, iGaming, and Gambling                                 +1.650.278.7416
Security                                                                   eBooks

                    Server-Push Identity
 Player posts ID to server                            ID(x)
 Server returns Challenge Phrase                      Challenge(IDx))
 Player posts encrypted Challenge Phrase              ID(x),E(Key(x),Challenge(IDx))
 Server validates Response
 Server creates updated ID & Key
 Server sends updated ID & Key encrypted in old key   E(Key(x+1),ID(x+1),SessionID)
 Player decrypts new ID & Key
 Player sends validation message to Server            SessionID,E(Key(x+1),SessionID)


    • Client gets new ID/Key pair from server
    • Server knows underlying identity of client
    • If duplicate made of client info, server can create an “Identity Fork”
      or take other action
    • You know a duplicate has been made, not which copy is a duplicate
    • Can be done with symmetric keys or public (asymmetric) key
      systems

                                                               steve@free2secure.com
Games, iGaming, and Gambling                                         +1.650.278.7416
Security                                                                        eBooks

             Collaborative Identity Generation 1
 Player creates new ID(cx+1), Transform of new ID, and Challenge1
 Player creates new DH random z and computes b z mod p
 Player posts Challenge Phrase to server
           ID(x),E(Key(x),T(ID(cx+1)), b z mod p,Challenge1)
 Server decrypts Challenge Phrase
 Server creates new ID(sx+1), Transform of new ID, and Challenge2
 Server creates new DH random y and computes b y mod p
 * Server creates new DH key              Key(x+1) = (b z ) y mod p
 Server posts Challenge Phrase to Client
           ID(x),E(Key(x),T(ID(sx+1)), b y mod p,Challenge1, Challenge2, H(Key(x+1))
 Client decrypts Challenge Phrase and validates Challenge1


 • Sample using Diffie-Hellman style key generation
 • Could easily be adapted to other public key algorithms


                                                                    steve@free2secure.com
Games, iGaming, and Gambling                                              +1.650.278.7416
Security                                                                         eBooks

             Collaborative Identity Generation 2
 (from previous page) Client decrypts Challenge Phrase and validates Challenge1
 * Client creates new DH key             Key(x+1) = (b z ) y mod p
 Client validates new DH key with received hash
 Client sends new ID(cx+1) to Server with hash of new Key and Challenge2
            ID(x),E(Key(x),ID(cx+1),H(Key(x+1)),Challenge2)
 Server validates new ID against previously received Transform and validates Key(x+1) hash
 * Server computes new ID                ID(x+1) = ID(cx+1)+ ID(sx+1)
 Server sends new ID contribution to Client
            ID(x),E(Key(x),ID(sx+1)
 * Client computes new ID                ID(x+1) = ID(cx+1)+ ID(sx+1)
 Client and sever use new ID(x+1), Key(x+1) pair


 • Active Identity System is really a temporary pairwise identity
   with a remote entity
 • Does not need to be client-server, could be peer-to-peer

                                                                     steve@free2secure.com
Games, iGaming, and Gambling                                               +1.650.278.7416
Security                                                 eBooks

 Active Identity is Part of an Overall Identity &
 Access Management Solution

                             To
                                Str
                                    en
                                 an gth
                                     d O en
                                        nli Pla
                                           ne tfo
                                             Se rm
     •  Digital Fingerprints                    cu i d
                                                  rity en
     •  User Name/Passwords                              tity
     •  Security Tokens
     • IP Address
     • Platform IDs
     • Active ID

                                                steve@free2secure.com
Games, iGaming, and Gambling                          +1.650.278.7416
Security                                                  eBooks


   Fighting Server
   Piracy


  • Client can detect server duplicates as server won’t have
    current identity/key pair
     – Can prevent connection to pirate server
  • Even if real server identity/key database gets
    compromised, clients will rapidly rekey to new
    identity/key pairs
  • Can also be used for traditional computer piracy
    detection system
                                                 steve@free2secure.com
Games, iGaming, and Gambling                           +1.650.278.7416
Security                                                             eBooks




   What next?
   • Don’t give up!

   • More security presentations at:
     http://free2secure.com/

   • Check out my book “Protecting Games”
       – Additional information at http://playnoevil.com/


   • You can “win” the security game
                                                            steve@free2secure.com
Games, iGaming, and Gambling                                      +1.650.278.7416
Security                                                                  eBooks

      About Me
  •   Steven Davis
       – 25+ Years of Security Expertise
           • Worked on everything from online
             games and satellite TV to Nuclear
             Command and Control and military
             communications
           • http://www.linkedin.com/in/playnoevil
       – Author, “Protecting Games”


  •   Why Free2Secure?
       – Security is too expensive and isn’t working. There has to be a better way.
         I’m exploring these issues for IT security, ebooks, games, and whatever
         else strikes my fancy at http://free2secure.com/ .
       – Join me there, ask questions, challenge assumptions, let’s make things
         better.

                                                               steve@free2secure.com
Games, iGaming, and Gambling                                         +1.650.278.7416

Contenu connexe

Dernier

Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Hararemasabamasaba
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...masabamasaba
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in sowetomasabamasaba
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 

Dernier (20)

Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 

En vedette

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 

En vedette (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

Piracy Protection and Online Identity Security with Digital Duplicate Detection

  • 1. Security eBooks Cryptographic Duplicate Detection For Access Management, Piracy Protection, and More Steven Davis steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 2. Security eBooks Protocols not Players or Computers That’s all you see online steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 3. Security eBooks Traditional Identification & Authentication Methods are very weak for verifying actual identities • Name/Password can be shared & compromised • ID/Key can be shared or compromised • “Digital Fingerprints” can be duplicated steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 4. Security eBooks • Powerful white list of good platforms • Improve association of players with platforms • Identifying problem platforms • Can be a very powerful technique Detecting to fight server piracy / ghost servers Duplicate • Support legitimate Identities sharing and backups steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 5. Security eBooks Core Idea Why not change identities AND keys at every session (or more frequently)? steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 6. Security eBooks Active Identity System - General Flow tic sta • Initialization be to – Done in a variety of ways ve ha – Identity can even be verified retroactively ot • Verify Current Identity/Key Pair sn doe • Update Identity/Key Pair e • Verify Update alu tit yV • Continue Operations en Id • OPTION - use “rolling update” to operate smoothly during identity changes • add an “A” or “B” Flag to messages • Send “rollover” command message steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 7. Security eBooks Server-Push Identity Player posts ID to server ID(x) Server returns Challenge Phrase Challenge(IDx)) Player posts encrypted Challenge Phrase ID(x),E(Key(x),Challenge(IDx)) Server validates Response Server creates updated ID & Key Server sends updated ID & Key encrypted in old key E(Key(x+1),ID(x+1),SessionID) Player decrypts new ID & Key Player sends validation message to Server SessionID,E(Key(x+1),SessionID) • Client gets new ID/Key pair from server • Server knows underlying identity of client • If duplicate made of client info, server can create an “Identity Fork” or take other action • You know a duplicate has been made, not which copy is a duplicate • Can be done with symmetric keys or public (asymmetric) key systems steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 8. Security eBooks Collaborative Identity Generation 1 Player creates new ID(cx+1), Transform of new ID, and Challenge1 Player creates new DH random z and computes b z mod p Player posts Challenge Phrase to server ID(x),E(Key(x),T(ID(cx+1)), b z mod p,Challenge1) Server decrypts Challenge Phrase Server creates new ID(sx+1), Transform of new ID, and Challenge2 Server creates new DH random y and computes b y mod p * Server creates new DH key Key(x+1) = (b z ) y mod p Server posts Challenge Phrase to Client ID(x),E(Key(x),T(ID(sx+1)), b y mod p,Challenge1, Challenge2, H(Key(x+1)) Client decrypts Challenge Phrase and validates Challenge1 • Sample using Diffie-Hellman style key generation • Could easily be adapted to other public key algorithms steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 9. Security eBooks Collaborative Identity Generation 2 (from previous page) Client decrypts Challenge Phrase and validates Challenge1 * Client creates new DH key Key(x+1) = (b z ) y mod p Client validates new DH key with received hash Client sends new ID(cx+1) to Server with hash of new Key and Challenge2 ID(x),E(Key(x),ID(cx+1),H(Key(x+1)),Challenge2) Server validates new ID against previously received Transform and validates Key(x+1) hash * Server computes new ID ID(x+1) = ID(cx+1)+ ID(sx+1) Server sends new ID contribution to Client ID(x),E(Key(x),ID(sx+1) * Client computes new ID ID(x+1) = ID(cx+1)+ ID(sx+1) Client and sever use new ID(x+1), Key(x+1) pair • Active Identity System is really a temporary pairwise identity with a remote entity • Does not need to be client-server, could be peer-to-peer steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 10. Security eBooks Active Identity is Part of an Overall Identity & Access Management Solution To Str en an gth d O en nli Pla ne tfo Se rm • Digital Fingerprints cu i d rity en • User Name/Passwords tity • Security Tokens • IP Address • Platform IDs • Active ID steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 11. Security eBooks Fighting Server Piracy • Client can detect server duplicates as server won’t have current identity/key pair – Can prevent connection to pirate server • Even if real server identity/key database gets compromised, clients will rapidly rekey to new identity/key pairs • Can also be used for traditional computer piracy detection system steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 12. Security eBooks What next? • Don’t give up! • More security presentations at: http://free2secure.com/ • Check out my book “Protecting Games” – Additional information at http://playnoevil.com/ • You can “win” the security game steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416
  • 13. Security eBooks About Me • Steven Davis – 25+ Years of Security Expertise • Worked on everything from online games and satellite TV to Nuclear Command and Control and military communications • http://www.linkedin.com/in/playnoevil – Author, “Protecting Games” • Why Free2Secure? – Security is too expensive and isn’t working. There has to be a better way. I’m exploring these issues for IT security, ebooks, games, and whatever else strikes my fancy at http://free2secure.com/ . – Join me there, ask questions, challenge assumptions, let’s make things better. steve@free2secure.com Games, iGaming, and Gambling +1.650.278.7416

Notes de l'éditeur

  1. http://paintingperceptions.com/videos/the-http://www.paintingperceptions.com/wp-content/uploads/2011/03/monoDamien.jpg http http://images3.wikia.nocookie.net/__cb20061109120654/uncyclopedia/images/1/12/MonaLisa.jpg http://1.bp.blogspot.com/-fnnRDjPhs8I/Ts4LO4RifQI/AAAAAAAACkE/FICafzhG68s/s1600/bin+laden+mona.jpg http://www.freakingnews.com/pictures/21000/Mona-Lisa-Jack-Sparrow--21109.jpg http://www.deviantart.com/download/83657642/Lego_Mona_Lisa_by_Eeveeisgerman.jpg http://www.artyfactory.com/pop_art_portraits/images/mona_lisa/mona_lisa_group_3.jpg http://cloud.kapilsoni.com/2009/11/What-Mona-Lisa-Looks-Like-002.jpg
  2. http://file.cdn.global.netmarble.com/img/Forum/40/2011/10/05/20111005134703.jpg