Get the latest tech news
TSforge: Reverse Engineering the Windows Software Protection Platform
By WitherOrNot
After wasting even more time trying to add Windows support to GDB through its Python API, I ended up biting the bullet and choosing the devil I knew, the IDA Pro debugger. This probably prevents some kind of side-channel attack, but more importantly, it means that I can "decrypt" the physical store by simply skipping this call in the debugger and letting spsys write the un-encrypted contents to the disk. Since we had few options to debug or fix this port, asdcorp decided to create an HWID value that would apply to all hardware, and yet again, it worked perfectly, even allowing transfer of activation between machines.
Or read this on Hacker News