Beefy Boxes and Bandwidth Generously Provided by pair Networks
Syntactic Confectionery Delight
 
PerlMonks  

Re^8: Why is it bad to hide the source?

by marto (Cardinal)
on Feb 28, 2011 at 22:31 UTC ( [id://890658]=note: print w/replies, xml ) Need Help??


in reply to Re^7: Why is it bad to hide the source?
in thread Why is it bad to hide the source?

"Fortunately I'm not talking about Bleach, I'm talking about the weak encryption that is built into perlc."

Again, this isn't encryption. You are misleading people into believe it is so. And more of the same here.

  • Comment on Re^8: Why is it bad to hide the source?

Replies are listed 'Best First'.
Re^9: Why is it bad to hide the source?
by daveola (Sexton) on Mar 01, 2011 at 11:29 UTC
    This isn't encryption?

    Either you don't understand what the software does or we are using different definitions of "encryption".. I will look to Wikipedia:

    http://en.wikipedia.org/wiki/Encryption

    As a further example, considered the *far* weaker encryption done by Rot13 (a subset of the encryption I use). If we again look to Wikipedia:

    http://en.wikipedia.org/wiki/Rot13

    We will see:

    "ROT13..is often cited as a canonical example of weak encryption...ROT13 is an example of the encryption algorithm known as a Caesar cipher" And so on and so forth...

    If ROT13 is encryption, which the rest of the world seems to agree with me on, then my encoding is encryption even more so, as ROT13 is essentially my encryption with a constant key.

    So.... It is encryption, whether you want it to be or not.

    Who is misleading who? We have to get all the way down to Re^9 and I am still presenting only facts, and I'm still being called misleading.

    Very frustrating.

    Please check your facts sir, I have checked mine, many times.

      Over the course of this thread and What happened to perlcc?, much has been said. The simple fact with the 'encryption' you claim to offer, the source can be determined fairly easily, without knowing the 'encrpytion' algorithm or the salt used. See Re^15: What happened to perlcc? and subsequent posts explaining how this can be achieved with access to the binary only or the .c file produced.

        And?

        If I give you an executable, can you extract the source? I'd love to see that.

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: note [id://890658]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this?Last hourOther CB clients
Other Users?
Others wandering the Monastery: (3)
As of 2024-04-19 22:20 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    No recent polls found