Re: UnShroud

new topic     » goto parent     » topic index » view thread      » older message » newer message

> > At execution time the coded would be decrypted
> > for use but would still be shrouded. The code
> > would never be COMPLETELY vulnerable.
> >
> > I will not be releasing any encryption techniques
> > that I design and use.
>
>         Yes, it would not be completely vulnerable, but you do have to hack
> ex.exe if their encrytption method is any good. (Like calculation on
> size, maybe somsort of inbuilt compression, location encryption,
> etc.)
>         Or maybe they can do the precompiling directly in the file (with
> some precompiling still to be done, like assigning memory addresses,
> however you could make it pretty inreversable)
>
>         Or the ex.exe can have some inbuilt protection not to execute code
> that reads a file which is partly equal to ex.exe and then have the
> code in a sort of sequence way which would only be possible with
> Euphoria.... (It would be impossible to write a program to read my
> EDOM files, it would be so big and difficult)

Like I said to LLH3, anything the computer can understand, the fanatic freaks
can read too...

Fortunately however, they aren't likely to be particularly interested, so just
trashing it a little will go a long way... (How long has the unshroud project
taken so far?...)

Anyway, I'm happy to leave the specifics to Craig. (And I think Craig is as
happy to have my punk kid nose out of it too...)

> Ralf Nieuwenhuijsen <nieuwen at xs4all.nl>
Anders

-------------------------------------------------------------------
Anders Eurenius <c96aes at cs.umu.se> ICQ UIN:1453793
Computer Science/Engineering student at the university of Umeaa
-------------------------------------------------------------------

new topic     » goto parent     » topic index » view thread      » older message » newer message

Search



Quick Links

User menu

Not signed in.

Misc Menu