Feeds

Keygen routine producing valid WinXP product keys?

Sounds like bad news for Microsoft's WPA...

  • alert
  • submit to reddit

Gartner critical capabilities for enterprise endpoint backup

A cracking system for Windows Product Activation publicised this week may present Microsoft's anti-piracy system with its most serious problem yet. It takes the form of a key generator which appears to produce valid activation keys for Microsoft products, and if this really is the case, it is difficult to see how Microsoft can differentiate between keys issued with legal product, and keys generated by the keymaker.

It sounds too good (well, depending on your outlook) to be true, but while forum operators are in general managing to keep a lid on people posting locations for the program, it seems clear from discussion threads on several of them that it is indeed producing keys that work. The keymaker first gained widespread publicity earlier this week at Heise.de, which tested it and says it generated 25 keys for XP Home overnight. Heise's report, in German, can be found here, while Neowin.net has a translation of the important bits here.

Judging by the time taken to generate keys there's a significant amount of crunching going on, but on the other hand as this is precisely the sort of thing Microsoft must have anticipated when it devised WPA, it's not nearly as much crunching as you'd expect. If one morally questionable teenie can successfully generate one operational key by leaving their home PC running overnight, then Redmond has quite clearly blundered. 25 in a night counts as blundering big-time.

Prior to the keymaker WPA had been cracked, although that rather depended on what you meant by the word; as Microsoft has heroically argued, being pirated wholesale and being cracked are in fact two different things. Philosphically, anyway. Patched versions swiftly became available when the software went gold, but essentially these can be termed unauthorised distributions/variants of the software, and although it means people can get it for free, Microsoft has the capability of zapping their installations as a side-effect of service packs and similar. As yet the company doesn't seem to have used Windows Update to deactivate warez systems, but it's possible.

The other major circumvention of WPA is via leaked keys for corporate versions, which are unlocked simply by entering the key, rather than it being necessary to activate over the Internet or by phone. Again, Microsoft can invalidate these keys at service pack time, and it has done so at least once in the past.

So the question as regards keymaking software is whether or not Microsoft has any way to differentiate between generated keys and the ones it has issued itself. If not, this generation of WPA is now surely toast. ®

The essential guide to IT transformation

More from The Register

next story
Assange™: Hey world, I'M STILL HERE, ignore that Snowden guy
Press conference: ME ME ME ME ME ME ME (cont'd pg 94)
Premier League wants to PURGE ALL FOOTIE GIFs from social media
Not paying Murdoch? You're gonna get a right LEGALLING - thanks to automated software
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
Ballmer quits Microsoft board to spend more time with his b-balls
From Clippy to Clippers: Hi, I see you're running an NBA team now ...
Online tat bazaar eBay coughs to YET ANOTHER outage
Web-based flea market struck dumb by size and scale of fail
Kate Bush: Don't make me HAVE CONTACT with your iPHONE
Can't face sea of wobbling fondle implements. What happened to lighters, eh?
Amazon takes swipe at PayPal, Square with card reader for mobes
Etailer plans to undercut rivals with low transaction fee offer
Call of Duty daddy considers launching own movie studio
Activision Blizzard might like quality control of a CoD film
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.