I Cracked a $200 Software Protection with Xcopy
Posted28 days agoActive25 days ago
ud2.ripTech Discussionstory
heatednegative
Debate
80/100
Software CrackingCode VulnerabilitiesDecompiler
Key topics
Software Cracking
Code Vulnerabilities
Decompiler
Discussion Activity
Very active discussionFirst comment
30s
Peak period
29
0-6h
Avg / period
11.3
Key moments
- 01Story posted
Dec 5, 2025 at 9:37 PM EST
28 days ago
Step 01 - 02First comment
Dec 5, 2025 at 9:38 PM EST
30s after posting
Step 02 - 03Peak activity
29 comments in 0-6h
Hottest window of the conversation
Step 03 - 04Latest activity
Dec 9, 2025 at 1:59 AM EST
25 days ago
Step 04
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
ID: 46170060Type: storyLast synced: 12/6/2025, 2:55:12 AM
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.
I'm just glad they didn't use iLok. It's been a pain for me as a legitimate user of a few iLok protected plugins.
It sounds like you didn't find any issues with either of them, except that the VST vendor chose not to protect the thing you were hoping to crack?
As another commenter wrote, the protection is there to keep honest people honest, like locking the front door of your house.
It's not foolproof and doesn't need to be. It's role is to make sure respectful users know that you'd genuinely prefer they not steal your stuff (not everyone actually does care about that).
1) Protecting the installer will take care of most casual piracy
2) Protecting the VST might lead to unpredictable performance and issues on something that needs to run in real-time
So they chose to only protect the installer, which seems like a very user-friendly choice. I both enjoyed the writeup and want to second supporting the developer by buying a license.
It’s kind of a rote “this is a bad implementation” post that’s pretty obviously about the DRM vendor and not the guy that made a bass boost plugin for djs or whatever it is.
If the Bass Bully developer didn't want the spotlight, maybe they should have programmed their $200 (!!!) plugin better. HN has gotten soft.
To me it reads like an ego trip rather than any kind of righteous vendetta against the author. Implicit in "look at the dumb thing this other person did" is "I'm smarter than them because I noticed the dumb thing".
You can't possibly know that by the mere lack of these DLLs from the import directory.
I suppose they could LoadLibrary/GetProcAddress at runtime, but that'd be a lot of effort for obfuscation.
* I highly doubt it was deliberate as some others are suggesting.
Yes, they're not a developer at all. They just purchased a tool called "Romplur", you can make VST plugins with it and then export as an installer.
I chose to protect only the installer with a simple lock-door method because my priority has always been stability and performance, especially at runtime. In the VST and plugin world, heavy or aggressive DRM can cause glitches or failures during a live performance. That risk felt far more harmful to my paying customers than the risk of casual piracy.
I understand that reverse engineering is part of how some people learn, and I am not here to criticize that. But when a post becomes a look-at-how-I-cracked-this thread, especially one that singles out a small independent developer, it starts to feel like a hit piece rather than a technical discussion.
The protection was minimal. It could be cracked. Maybe I should have done more. But this was not about being stingy with security. It was about delivering a stable and reliable plugin to real users without introducing bugs, system conflicts, or performance issues that can come from heavier protection systems.
I appreciate honest technical discussion and feedback. I also hope people understand that not every developer has a large team or a big budget. Many of us have to balance protection with usability, and for me, making music was more important than building an unbreakable DRM wall.
If you like the plugin and it helps your workflow, supporting it by buying a legitimate license goes much further than any crack-test ever will.
Thanks for taking the time to read this.
Josh, Director Bass Bully VST
No, not really. You "cracked" some random guy's $20 VST plugin. You never actually cracked Enigma Protector. The article started talking about cracking it then pivoted at the end to "I wrote a Python script to copy files from the installer" and said "the protection itself works fine"