Before there were studios worth billions, before there were microtransactions and battle passes, before games were “services” — there was a floppy disk, and someone who wanted a copy. That desire, and the industry’s desire to stop it, launched one of the longest-running technological arms races in computing history. It’s still going.
The story of game cracking is, in many ways, the story of computing itself: a story about obsession, ingenuity, ego, and the strange alchemy that happens when brilliant people are given a locked door and told they can’t go through it.
1970s
Before There Was a Scene
In the earliest days of personal computing, “copy protection” was almost an afterthought. Software shipped on floppy disks, and duplicating a disk was as straightforward as the hardware allowed. The first pirates weren’t organized criminals or ideological rebels — they were hobbyists, tinkerers, and friends who wanted to share something cool with someone else.
Bulletin Board Systems, or BBS, became the original piracy infrastructure. You dialed in over a modem (slowly — agonizingly slowly), browsed available files, and downloaded whatever caught your eye. It was anarchic, communal, and entirely unglamorous. Nobody called it a “scene” yet. It was just people doing what people do: sharing things.
It was never really about the money. It was about the glory of being first — and the proof that no lock could hold.
1980s
The Golden Age & The Birth of the Scene
The 1980s changed everything. As the Apple II, Commodore 64, and DOS PCs exploded in popularity, so did the commercial software market — and with it, copy protection. Publishers began writing deliberately malformed sectors to disk, encoding hidden checksums, varying track densities, and creating physical quirks that standard duplication software couldn’t reproduce. The arms race had officially begun.
In response, the cracking community organized. Groups formed with names like INC (International Network of Crackers) and The Humble Guys (THG), and they competed — fiercely — to release cracks before anyone else. Speed became the currency of status. Being “first” was everything.
From this culture emerged one of its most beloved artifacts: the crack intro, or cracktro. Before you played the game, you’d see it — a small animated demo with scrolling text, chiptune music, and the group’s name rendered in elaborate pixel art. It was a signature. A boast. An art form. Many cracktros were technically more impressive than the games they preceded.
Notable Groups — Then & Now
- Razor 1911 — Founded 1985. One of the longest-running groups in scene history.
- The Humble Guys (THG) — 1980s DOS legends. Responsible for hundreds of releases.
- Deviance / Fairlight / SKIDROW — 2000s era powerhouses.
- CPY (CONSPIR4CY) — Became the gold standard for Denuvo cracks in the 2010s.
- Empress — A solo cracker who redefined what one person could do against modern DRM.
- voices38 — The current heir apparent. Working alone through the post-Empress era.
1990s
The Internet Changes Everything
CD-ROM brought new challenges. Games ballooned in size — from kilobytes to hundreds of megabytes — and publishers embedded new protections: SecuROM, SafeDisc, physical disc checks that required the original CD to be in the drive. For a while, these worked.
But the internet matured, and with it, the warez scene became a global machine. IRC channels and private FTP servers replaced BBS networks. Releases spread across continents within hours. Groups like Razor 1911 formalized a culture of 0-day releases — cracks dropped on the same day as commercial release, sometimes before retail copies hit shelves.
The scene developed its own elaborate rules, hierarchies, and pride. A bad release — one that didn’t work, or broke the game — was a mark of shame. Quality mattered, paradoxically, in a world built entirely on theft.
2000s
Keygens, Dongles & the DRM Wars
Publishers responded to internet distribution with a new weapon: online activation. Instead of checking for a disc, games now phoned home — verifying a serial key against a remote server. In theory, this was unbeatable. In practice, crackers adapted within weeks, producing keygens: small programs that reverse-engineered the key validation algorithm and generated valid serials on demand. Some keygens were themselves artistic productions, complete with music, animations, and branding.
StarForce, a Russian DRM system, became notorious in the mid-2000s for its aggressive approach — installing kernel-level drivers that remained on your system even after uninstalling the game. Players hated it. Crackers loved the challenge. It fell too.
Denuvo was supposed to be the last DRM anyone would ever need. The crackers gave it eighteen months before they walked straight through it.
2010s
Denuvo and the Great Standoff
Then came Denuvo Anti-Tamper. Introduced around 2014, it was a different kind of protection — not just a lock on the executable, but a system that continuously mutated and validated the game’s code at runtime, making static analysis nearly impossible. Early Denuvo games held out for months. Some for over a year. The scene, for the first time in decades, seemed genuinely stumped.
FIFA 15 took three months. Just Cause 3 held out for nearly fifteen. Forums buzzed with speculation: had publishers finally won?
They hadn’t. Groups like 3DM, CPY, and CODEX worked in the shadows, and one by one the walls came down. By the late 2010s, Denuvo cracks were arriving within days of release. The cat-and-mouse had resumed — faster than ever.
2018—2024
The Modern Era: Speed, Solo Acts & Walls That Hold
The most remarkable development of the modern era isn’t a group — it’s an individual. A solo cracker known only as Empress became the dominant force in Denuvo cracking, working alone and releasing cracks that entire teams had failed to produce. Her work was controversial — she charged for early access to cracks, which violated scene etiquette — but technically, it was undeniable.
Meanwhile, publishers discovered the one defense that actually works: servers. Games like Diablo IV, Destiny 2, and Final Fantasy XIV run their core logic — loot, progression, the world itself — on remote servers that no cracker can touch. You can decompile the client all you want; without the server, you have nothing. This isn’t DRM. It’s architecture. And it’s the wall the scene hasn’t climbed.
Elsewhere, the economics of piracy have quietly shifted. Game Pass, PlayStation Plus, deep Steam sales, and free-to-play games have made legitimate access cheaper than ever. For some players, the effort of finding and running a crack — with its attendant risks of malware — no longer makes sense. The war continues, but the battlefield has changed.
2025—Now
voices38, the Hypervisor & the War Reborn
When Empress stepped away, many assumed the post she vacated would stay empty for a long time. It didn’t.
A previously unknown cracker operating under the handle voices38 began quietly working through the long list of games that had sat uncracked for years — particularly EA’s catalogue, which had become a kind of monument to Denuvo’s durability. FIFA 20, FIFA 21, Need for Speed Heat, Need for Speed: Hot Pursuit Remastered — titles players had given up on — started falling one by one.
What made voices38 notable wasn’t just the volume, but the approach. He was doing the old-fashioned thing: reverse engineering Denuvo’s protections game by game, producing what the community calls a proper crack — one that doesn’t require disabling your security settings, doesn’t depend on virtualization tricks, and just works. He communicates directly with players through Reddit, in a manner more transparent than almost any cracker before him.
While voices38 was working through the backlog, a different faction of the scene was building something architecturally new — and far more disruptive.
In December 2025, a collective called MKDev released a proof-of-concept that bypassed Denuvo not by cracking it, but by lying to it. The technique is known as a hypervisor bypass, and it represents the most significant technical shift in the history of game cracking.
Here’s what it does. A hypervisor is a layer of software that sits below the operating system — at what’s called Ring -1, a privilege level the OS itself can’t see into. By installing a custom hypervisor, MKDev could intercept the CPU instructions that Denuvo uses to verify itself, and feed back false validation data in real time. From Denuvo’s perspective, everything checks out. The game runs. The DRM never knew it had been fooled.
The practical consequence was immediate: Resident Evil Requiem received a pirated release within one hour of launch. Crimson Desert circulated on the same day it came out. After years of Denuvo holding release windows closed for weeks or months, zero-day cracks were suddenly a reality again.
The catch — and it’s a significant one — is what the bypass requires of the user. To install a third-party hypervisor, you have to disable Secure Boot, Virtualization-Based Security, and other core Windows protections. The hypervisor then runs with near-unrestricted hardware access, operating at a level invisible to antivirus software. Even MKDev’s own documentation warned users to re-enable their security features when done. This is not a crack you run on your everyday machine.
The scene itself is divided. Voices38 has been explicit about his preference for proper cracks over hypervisor releases — a clean break with no security trade-offs. Major repackers initially refused to carry hypervisor builds. The community has settled on a convention: releases using the method are clearly labelled [HV], so users know what they’re getting.
Irdeto, Denuvo’s parent company, has acknowledged the threat and confirmed countermeasures are in development. Their stated goal: get back to a world where games stay protected for at least the critical early weeks after launch. What that countermeasure looks like remains unclear. Denuvo could check for the presence of third-party hypervisors by measuring CPU latency, or move to more frequent license-ticket validation. The community is already working on the next iteration — Hypervisor 2 aims to reduce the security compromises required to use it.
Meanwhile, voices38 kept working. Doom: The Dark Ages — a 2025 release on a modern Denuvo build — became the first game from that year to receive a proper crack. Shortly after, Resident Evil Requiem, a 2026 release with the latest Denuvo version, fell in just 41 days. On Reddit, voices38 was direct about what it meant: “All can be cracked.”
Two methods, two philosophies, one result. The post-Empress vacuum had been filled — twice over.
The pattern holds. Every solution generates a new problem. Every lock generates a new lockpick.
The Lock and the Lockpick
Every lock in history has eventually been opened. That’s not cynicism — it’s the oldest pattern in security. The value of a lock is not that it can never be broken, but that breaking it costs more than the contents are worth. The game industry learned this slowly, and the crackers taught them.
What endures from fifty years of this war is something unexpected: a culture. The cracktros of the 1980s are studied now as early examples of demoscene art. The scene’s internal competition pushed the technical limits of what was possible on consumer hardware. Crackers who went legitimate became some of the best reverse engineers and security researchers in the industry.
The war isn’t over. It will never be over. As long as there are locks, there will be people who find opening them more interesting than anything behind them.