[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: computer-go: Authenticating the identity of a remote go-playing computer program




> Also, authenticating  that someone is  not using  a program written by
> someone else is also not simple.  It  is possible to modify the stolen
> program to obscure  the fact that it is  being used, and to make minor
> changes so  that  it maintains most of   its playing strength  without
> playing exactly  the same moves.  This  has already  happened at least
> once.


Hi David,

Yes, this has happened in chess competitions too, actually a number of
times.  Public  domain  programs, especially  good ones,  makes this a
major concern.  I don't think there are good public domain GO programs
(as compared to programs  like your own) so this  may not yet be a big
problem  in Go,  but   commercial programs can  also  be  hijacked and
represented as belong to someone else.

Consider: I once developed an auto tester to use with commercial chess
programs.   It  looked at screen memory,   oberseved state changes and
used this to decode  moves.  The arbiter  program could fake  keyboard
and mouse input  to interact with the  program.   Now had I wanted,  I
could put my own  GUI  over the top of   one of the good programs  and
tried to represent it as my own!  With a  little care, you can do just
enough reverse engineering to alter its playing style a little without
making it play significantly weaker.

Don