The Prolok Saga (Was: Applesauce FDC

Fred Cisin cisin at xenosoft.com
Tue Nov 2 15:35:10 CDT 2021


On Tue, 2 Nov 2021, dwight via cctalk wrote:
> The trickiest protection I've seen is where there is a hole punched 
> through the disk on one track. The idea is that the protected program 
> writes to that track and expects to see a failure to read that track.
It doesn'tneed to be a hole all the way through, merely any physical 
defect that renders that spot unusable.

The "Physical Defect" protection.

Copy protected disks had already been made with flawed content to produce 
an error on READ, and were easily circumvented by the "duplicate" copy 
having flawed content. The next step was to have a physical defect, so 
that the protection software would WRITE to the bad track, and confirm 
that the track really was damaged.
So, they would scratch the disk.
In the case of Prolok, the check to confirm a physical defect consisted of 
writing all zeroes to that area; verifying all zeroes; writing all ones; 
and verifying all ones.


Vault Corporation produced "Prolok" with a physical defect.  To make it 
MUCH MORE IMPRESSIVE to investors and clients, instead of a roomful of 
people scratching disks with paperclips, they used a "laser fingerprint" 
(use a laser, instead of a paperclip).

Since they gave the same or similar subroutines, that checked for the 
defect, to every client, it was cracked with software that would locate 
that subroutine, and replace the subroutine call with NOPs or gut the 
innards of the subroutine.  The cracks were often posted on Compuserve. 
(Vault sued Quaid software for "CopyWrite"/"RAMKEY")
https://casetext.com/case/vault-corp-v-quaid-software-ltd )

For "cloning" (pirating copies, often with the Central Point Option 
board (flux hardware)), software was developed that would 
identify the location of the defect, the cloner would then attempt to 
scratch the disk at that location, and then the software would locate the 
defect and juggle stuff around to put the content in the right place(s) 
relative to the defect.


But, Vault Corporation wasn't satisfied until they shot themselves in the 
foot with very high caliber rounds.
They announced "Prlok PLUS".  W. Krag Brotby (chairman of Vault) said that 
it would, if it detected a "fake" copy, wipe out the user's hard disk!
Even at the announcement of Prolok PLUS, the computer marketing 
community was aghast and enraged.  It doesn't take much to realize the PR 
nightmare, and the legal liabilities for damaging a customer computer, 
even if it was NOT a false positive!

Ashton-Tate, the largest Prolok client for dBase III, and part 
owner of Vault, immediately cancelled their contracts.  And announced 
that they had done so, that they had never used Prolok Plus, never would, 
and no longer used Vault Corporation products.
Almost all of Vault's other clients follwed suit.

Prolok Plus never made it to market!
'Course the "word was out".  Few people realize that it was NEVER 
actually put to use.  In fact some of the more idiotic newspaper "solve 
your computer problems" columnists, when stumped, would actually speculate 
"maybe your computer was attacked by an out of control copy-protection 
program."


So, we ended up with a mythical monster, and the creator of that mythical 
monster was vanquished.

If anybody can document an actual existence of Prolok Plus, I would like 
to hear about it.


There is little mention of it on the web, but:
https://tech.slashdot.org/story/08/06/09/1927205/a-history-of-copy-protection
"Re:Ahhh, holes burned in disks (Score:5, Informative)"

https://books.google.com/books?id=9y4EAAAAMBAJ&pg=PA19&lpg=PA19&dq=prolok+plus+copy+protection+vault+corporation&source=bl&ots=9Y7SBcnFx9&sig=ACfU3U3JDSEI-QjLjMi1V_gWdPq8gaHrHg&hl=en&sa=X&ved=2ahUKEwjijpjCufrzAhX2TDABHXh2DBgQ6AF6BAgHEAM#v=onepage&q=prolok%20plus%20copy%20protection%20vault%20corporation&f=false

https://www.pcjs.org/blog/2019/05/05/
Kryoflux display of Prolok

--
Grumpy Ol' Fred


More information about the cctech mailing list