We introduce a novel software-protection method, which can be fully implemented with today’s technologies, that provides traitor tracing and license-enforcement functionalities, and requires no additional hardware nor inter-connectivity other than those needed to execute the respective protected software. In [1] authors introduce the secure triggers and show that it is secure, modulo the existe...