Re: UnShroud
- Posted by Anders Eurenius <c96aes at OXE.CS.UMU.SE> Jul 05, 1997
- 707 views
> > At execution time the coded would be decrypted > > for use but would still be shrouded. The code > > would never be COMPLETELY vulnerable. > > > > I will not be releasing any encryption techniques > > that I design and use. > > Yes, it would not be completely vulnerable, but you do have to hack > ex.exe if their encrytption method is any good. (Like calculation on > size, maybe somsort of inbuilt compression, location encryption, > etc.) > Or maybe they can do the precompiling directly in the file (with > some precompiling still to be done, like assigning memory addresses, > however you could make it pretty inreversable) > > Or the ex.exe can have some inbuilt protection not to execute code > that reads a file which is partly equal to ex.exe and then have the > code in a sort of sequence way which would only be possible with > Euphoria.... (It would be impossible to write a program to read my > EDOM files, it would be so big and difficult) Like I said to LLH3, anything the computer can understand, the fanatic freaks can read too... Fortunately however, they aren't likely to be particularly interested, so just trashing it a little will go a long way... (How long has the unshroud project taken so far?...) Anyway, I'm happy to leave the specifics to Craig. (And I think Craig is as happy to have my punk kid nose out of it too...) > Ralf Nieuwenhuijsen <nieuwen at xs4all.nl> Anders ------------------------------------------------------------------- Anders Eurenius <c96aes at cs.umu.se> ICQ UIN:1453793 Computer Science/Engineering student at the university of Umeaa -------------------------------------------------------------------