Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Obfuscation with encryption can be done with good ciphers, like AES, but the key is still shipped with the code, so it's still just cat and mouse.

It's a little different if the key is hardware specific, so each binary only runs on one system and it's hard to extract the keys, but that's not a typical setup. Usually it's this code needs to run on the general public's computers or phones, and that's too general a target to rely on hardware crypto.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: