In terms of video games, cheat tools like the Game Genie could be thought of as dongles.īut in the late 1990s, these devices were able to shrink thanks to USB.
These devices generally hooked up to serial or parallel ports throughout the 1990s, with adapters that allowed users to continue to plug in devices such printers. While obviously totally made up, it nonetheless became something of an urban legend. He didn’t drive a fancy car, but dressed in his favorite Comdex T-shirt and faded blue jeans, he set out to change the course of the software story,” the fable started. This has led to fun stories, the most colorful of which was invented by the tech company Rainbow Technologies, which, in a 1992 advertisement than ran in Byte, invented a character named Don Gall who they claimed the device was named after. Of course, people aren’t aware where they actually came from in the first place, as The Atlantic’s Garber implied.
In fact, they got more sophisticated, adding their own processing capabilities that interacted with the software being used. But dongles for more high-end or specialized software products, along with employee security, never really went away.
Once unscrambled, the program is loaded into the computer’s memory and runs in the normal way but it is not difficult to remove the built-in checks.įor games, these approaches were eventually replaced by copy-protection schemes inside manuals or by different distribution approaches, like shareware. The key to this simple encryption is held by the dongle which passes it to the computer’s operating system (the program which coordinates the computer’s operations). Instead of supplying a program in plain computer code, some or all of the instructions are scrambled. The dongle system has been refined by some companies. One expert says this task takes about two hours. Unfortunately, there is nothing to prevent the owner of a dongle-protected program from displaying the program code on his computer screen and removing the dongle check from it. Most dongles do not prevent programs from being copied, but they stop the copies from being used, since each copy needs a matching dongle to work. If it has not been plugged in the program will not run. A program protected by a dongle contains a routine that asks a computer to check whether the dongle is present and sometimes to read a code from it.
The dongle is a small plastic box which plugs into one of the ports at the back of a computer. But it reflects a decades-long legacy of tying security to actual hardware that, for some programs at least, persists to this day.Ī 1984 New Scientist piece explained the dynamic that led to the growing popularity of dongles throughout the period, but noted that despite their goal of security, they ultimately were seen as easy to break by technical users: To those that only lightly follow technology, the existence of this port likely made no sense.
Last year, when the latest iteration of the Mac Pro came out, one thing that may have confused observers looking at this machine, which they will likely never use, is the unusual placement of a USB-A port on the machine’s motherboard. ( Wikimedia Commons) The dongle’s original legacy as an antipiracy tool