Wishes for MQL5 - page 14

 
notused:
Parabellum:

Two key system.


A wants to sell/transfer an advisor to B. B generates two keys on his machine: a private (secret) key and a public key. The private key is kept by B under 100 locks. B gives the shared key to A who uses this key to create an encrypted EX4 file and gives the file to B and only B uses his secret key to decrypt EX4 file. With a shared key, a secret key cannot be made. An intruder will have B's shared key, but will not be able to do anything with it.

According to Philip R. Zimmermann's theory, the PGP program.
Uh-huh, and if intruder B? That's usually the problem. And PGP itself isn't infallible.


Gentlemen, please explain:

1. How will the terminal execute the advisor's instructions without being able to decrypt it?

2. If the terminal on the "attacker's" side can decrypt the file, why can't the "attacker" do it?

 
Prival:

... or it's easier for them to hold a contest and ... you can finish the rest. For they have the compilation algorithm

Option 1: Before sending, you should agree with yourself that you "change" the algorithm of the Expert Advisor for the Prize. (The prize and other benefits that can be obtained if your Expert Advisor shows itself worthy)

Option 2. For the Championship, write a "special" Expert Advisor, as I think Luis Guillermo Damiani did this year

If I may offer some advice: Trust the organizers.

Regards Ilya Karakuts

 
There is no need to trade manually in this case. Just don't hand over your top-secret EAs to third parties. Not even in ex4.

Complete restoration of source code by compiled code is impossible in principle (if only because sources and objectniks are not isomorphic, i.e. from one objectnik one can get infinitely many corresponding sources, and from source one can get as many different objectniks). Therefore we will talk about reconstruction of algorithm. I hasten to please you, this task is rather difficult, and depends mainly on code size (more precisely on quantity of RELATIONSHIPS between different code parts), but, I repeat, at present time it is arranged precisely so and it does not need to change anything. And, again, no additional cryptographic means can REALLY increase this protection. Such tools will give a false sense of security, which is often much worse than no security at all, because it leads to unwarranted carelessness. It's as if a person who bought a gun but doesn't know how to use it would suddenly start walking around at night in unsafe neighborhoods which under other circumstances he would avoid.

2 Parabellum:
In this scheme, only the transmission channel is protected. For protected channel installation there are a lot of solutions already invented, perfectly realized and proved themselves in practice.
Prival, in this case, is not afraid that ex4 will be intercepted on the way, but that it will be used for his dirty purposes by the very one to whom the advisor has been passed (as you have already been told: B is an intruder).
 
Prival:
notused:

Trade hands and don't sweat it - or do you need to be told 100 times that absolute protection does not and cannot exist in principle?
Thanks for the reply at least. I've tried it by hand, it's worse and much worse. Automatic is better. Just now thinking about sending an expert to the championship. It's a pity only users participate in this discussion.

I didn't immediately notice your concerns about the Championship. I have to disappoint you: You see, both the client and the server are closed, but there is some network activity going on. If the methaquotes wanted your EA, they would be able to stealthily transmit it directly from your computer. Let's now look at the pros and cons:

pros:
They acquire a bunch of advisors, some of which are grails

cons:
They lose their reputation and along with their reputation, they lose clients and close their business.

I don't know about you, but I would not trade my real money making business and client base for a phantom opportunity to get a grail someday. I think the methaquotes are aware of that too
 

Amirul do not worry, stealing from my computer (important information) is possible only physically together with the computer and you have to be very careful, even full access to the computer via MT will not do anything. For a fee I can tell you how to do it :). I am an experienced sysadmin. I posted my suggestions on how to protect my code in MQL4 here. It seems to be more appropriate there.

You still haven't answered my 1 question, maybe you missed it.

You seem to possess a lot of knowledge in this field. Please give your estimation of how much time an MQL developer that knows exactly how an executable ex4 file is generated would need. Having this ex4 file in hand to restore the source code of mq4, the interest is purely theoretical, how much time is needed for that. sec, min, hour, day ?

 
Prival:
notused:
Trade hands and don't sweat it - or do you still need to be told 100 times that absolute protection does not and cannot exist in principle?
Thank you at least for that answer. I tried it by hand, it's worse and much worse. The machine is better. Just thinking about sending an expert to the championship now. Too bad only users are participating in this discussion.
http://forum.alpari-idc.ru/post493864-329.html
 
Prival:

Amirul don't worry, you can steal from my computer (important information) only physically together with the computer and then you have to be very careful, even full access to the computer via MT will not do anything. For a fee I can tell you how to do it :). I'm a sys admin with experience. I posted my suggestions on how to protect my code in MQL4 here. It seems to be more appropriate there.


You still haven't answered my 1 question, maybe you missed it.


You seem to possess a lot of knowledge in this field. Please give your estimation of how much time an MQL developer that knows exactly how an executable ex4 file is generated would need. Having this ex4 file in hand to restore the source code of mq4, the interest is purely theoretical, how much time is needed for that. sec, min, hour, day ?



1. I was not referring to all the important information on the computer, but only the EAs to which the terminal naturally has access
2. I have answered this question. First, the source code cannot be restored exactly; second, the algorithm is actually very difficult to restore (including the current state of affairs); third, I cannot give an estimate of time, because to know how much time it takes "time for a MQL developer who knows exactly how an executable ex4 file is generated", you have to be that developer, and the time is highly dependent on the program. The only thing you can FULLY count on is that if your Expert Advisor is not interesting, it will never be "cracked", and if it is very interesting, it will be cracked in a relatively short period of time. As Bruce Schneier puts it "Against the average user, anything works; there's no need for complex security software. Against the skilled attacker, on the other hand, nothing works". To give a rough estimation I have to go back to DVD/HD-DVD.
CSS (security system in DVD) appeared in 1996 and was cracked in 1999
AACS for HDDVD/BlueRay protection which has appeared in spring 2006, has been reverse engineered by autumn of the same year (decryption source code was ready - only a key was missing). The key itself has been found in spring 2007.

Both of these protections were developed by large corporations, and huge amounts of money were spent on them. Among other things, the very lack of knowledge (security by obscurity) played into the hands of the security developers. Now calculate by yourself how much time it will take to reverse engineer your code.
 

Prival, let us create a super-duper protection for the EA. In order for the EA to work, it has to be loaded into RAM as a program. We remove the memory dump and our protection is over.

 
I've been messing around a bit, mixed up demo and real, it's good that it turned out to be profitable... I thought it would be nice to have the terminal working on a real account highlighted in red when opening orders in the same window or something like that, for weirdos like me)
 

And my wish in general for MQL4 is to add a constant to MarketInfo to determine the maximum number of allowed orders (like for competition = 3).