Ooops. Seems like I spoke too soon.
@__m0ffx: __I was just wondering on how the courts would determine whether the copying of the data from the CD to the hard disk was done by "The Software" or not.
Certainly there is no foolproof way to determine that, especially in the case of a "cheap" game. Proof of the game data files being copied to the disk can be spoofed by the game itself or can be erased by the "offender". Would there be any financial incentive in developing such a restrictive technology for a game. As of now, I dont think so.
@themagni: Yes, I get your point. But you see, there are people I know of, who think that locking the safe key blueprints inside the very safe it is designed to protect, makes the safe secure. Ok, bad analogy. Compromising the encryption algorithm shouldn't compromise anything, not even the key. But some people think otherwise and they could be practicing law somewhere.