If you have good enough programmers, that know enough about secure installation, encapsulation, cryptation and digital signature, you may be able to make software that is nearly impossible to copy. Privacy becomes so difficult and timeconsuming that it is not worth the time. A simple example:
- Encrypted communication on download.
- An encrypted key is installed on the client computer.
- A radom generated code that can only be used n times pops up before the installation is complete.
- The customer has to verify this code before finishing installation.
- When that is done, the encrypted key is destroyed and the installation finishes.
- Copying is now a problem of copying the executable version of the program. That may be difficult if it is combined with a secure installation, that is related to a digital signature / sertificat on the client computer.
Music may be recorded, so this is not about music. What is a copy? Windows was not a copy of the Mac OS and Excel was not a copy of Lotus. Reverse engineering is always possible, but it may be very time consuming. Is it criminal to make reverse engineering software?
Is it criminal to make guns and crowbars? A tunnel may be used to commit a break-in. File sharing systems may be used to download freeware and pirate copies. Period!
"I worry about my child and the Internet all the time, even though she's too young to have logged on yet. Here's what I worry about. I worry that 10 or 15 years from now, she will come to me and say 'Daddy, where were you when they took freedom of the press away from the Internet?'"
--Mike Godwin, Electronic Frontier Foundation.