tag:blogger.com,1999:blog-10770855.post2238416419809870585..comments2024-03-28T03:20:57.393-04:00Comments on The Little Calculist: Compilation, obfuscation, encryptionDave Hermanhttp://www.blogger.com/profile/00405190527081772997noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-10770855.post-25259730515333346222008-04-21T05:58:00.000-04:002008-04-21T05:58:00.000-04:00The programmers you talk about don't want encrypti...The programmers you talk about don't want encryption but hashing. Every encryption is two way and if the user can run your bytecode he can read it too. He can read your binary as well but this as hardly any resemblance to the code the programmer wrote (compared to a high level bytecode like Python's).jpchttps://www.blogger.com/profile/05403272030490907018noreply@blogger.comtag:blogger.com,1999:blog-10770855.post-7990346043346451112008-04-20T13:05:00.000-04:002008-04-20T13:05:00.000-04:00I think the encryption factor is just a happy coin...I think the encryption factor is just a happy coincidence. I can't easily determine the source code that produced the executables from the executables themselve on my Linux laptop, but I can get the sources easily. That's not true for the Windows executables on my laptop, and Microsoft likes it that way.<BR/><BR/>Some have claimed that my source code is self-encrypting. :-)<BR/><BR/>-- PaulPaul Stecklerhttps://www.blogger.com/profile/13416750891822431224noreply@blogger.com