Reboot, let it load for a few seconds, then open the disk drive door. It will print "I/O ERROR" and drop to the basic prompt. At this point, the autorun flag is set, but you can clear it by typing "FP". Close the disk drive, then you can load any of the basic programs and list them. If you look through the listings, you will find some CALLs, which switch the RWTS. So I just loaded the files, switched the RWTS, and saved them to a normal disk. Ta-da!
This also explains why the BASIC programs were obfuscated. Once you find the calls to switch the RWTS, the rest is easy. Getting around the obfuscation wasn't too hard though. I just ran the program and then interrupted it.
I do suspect that I had a different version. The directory listing looks a bit different, and I don't recall so many control characters in the filenames. It's possible that they published an updated version with more obfuscation (although it's also possible that I've just forgotten after so many years).
As as aside, I wasn't primarily interested in reverse-engineering the copy protection when I did this. I was more interested in their graphics drivers. The program had a thing where it would override the standard functions for drawing characters to the screen, so you could use the standard PRINT command and instead of using text mode, it would draw bitmapped characters into the graphics page. I thought it was rather clever.
Wow. The timing of this post was opportune, because just yesterday I had a chance to see (again) Bob Davidson, the husband of Janice (Jan) Davidson and a leader of Davidson & Associates, at a meet-up of alumni of various Davidson Institute for Talent Development programs for young people. The Math Blaster software was an early example of successful edutainment software, and it led to quite a bit of revenue that funded other software titles developed in-house or acquired over the years by Davidson & Associates.
Jan and Bob Davidson timed the Dot Com boom perfectly in choosing a time to leave active management of Davidson & Associates and begin funding philanthropy, which for them has been most devoted to developing programs for unusually bright young people in the United States. The best-known program of the Davidson Institute is the Davidson Fellows program, which gets in the news at least once a year as new Davidson Fellowship awards are announced, but the biggest program by number of young people involved is the Davidson Young Scholars program, which includes several alumni and I think some current members who are active participants here on Hacker News.
We talk here on Hacker News about some other software entrepreneurs who get in the news a lot these days for their philanthropic efforts, but I thought I should give a shout-out to one of the early adopters of a career change to full-time philanthropy funded by a software fortune, the Davidsons, because their philanthropy has a direct influence on the Hacker News community.
I find that very nostalgic for some reason, and it doesn't seem to hurt readability at all.
I remember in '80s and '90s copy protection was a major focus (for software companies and legislators alike). As a kid of that era, I remember looking for cracks on Usenet and FidoNet.
More info on Copy Protection here:
I think the real difference is the constant, relentless change in platforms presented to mobile phone consumers. Every year, it's a new phone, a major operating system upgrade, or something else disrupting the ecosystem, so that no out-of-band trade in raw files can take root.
When you have a zombie fanbase chasing the latest glitter, and disruptive changes introduced every six months, it's tough to gain traction when you have expend so much energy just to keep up with the herd.
When DRM was only enforced by the software, you just patched over the software and were good to go. Now that it's enforced by the operating system, it no longer appears so simple to the average user.
Walled gardens, and the like, are really about server side retention of discrete copies, requiring a user to stream content by means of a continuous connection, or loading content onto a trusted (locked) system that the end user cannot (or rather, should not) directly control.
They're different models of control, but both have been around for a while.
With a walled garden model, you're visiting a restaurant and the food comes to you already prepared.
With copy-protected content, you can buy and keep as many packets of instant food, and mix with water whenever you want, but you're prevented from understanding how to formulate the mix yourself from raw precursor ingredients, although no one can stop you from trying.
I think this is the chart he's referring to:
Sadly, it isn't currently runnable in the browser, but I'm sure that will be fixed soon.