Beefy Boxes and Bandwidth Generously Provided by pair Networks
good chemistry is complicated,
and a little bit messy -LW

Re: Extract perl2exe code

by leocharre (Priest)
on Nov 21, 2009 at 17:00 UTC ( #808604=note: print w/replies, xml ) Need Help??

in reply to Extract perl2exe code

I hope this teaches you a lesson. Hiding code.. tsk tsk.

"..system should be secure because of its design, not because the design is unknown to an adversary.."

Now, Kerckhoff is a cryptology guy- but all of this deals with security.

Security.. people misunderstand what that means.. so much. Security is not just safety from malicious attackers.
Security is protection from data loss- from bugs.
It's double tripple checking output before you let if go- even though you *know* it's not necesssary to do so.

I understand releasing this program this way- solved the problem at the time. But you know there's another way of doing it. There's always another way. Maybe the software could have been written completely free- and maybe via some mechanism- when it runs- it asks for some permission token or piece of data from a remote server- and then.. with that- proceeds to do what you need. Who knows.
But, there are ways.

Of course the obvious question everyone is asking- is why was the source not in version control? Maybe you're the first one who asked this question at this point.

I hope you may be inspired to look at other ways of solving this problem in the future. If you're concerned with the authorities- you know.. the boss.. they just want the stuff to work- so they can worry about their own tasks.

Log In?

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://808604]
and all is quiet...

How do I use this? | Other CB clients
Other Users?
Others romping around the Monastery: (3)
As of 2018-02-18 23:06 GMT
Find Nodes?
    Voting Booth?
    When it is dark outside I am happiest to see ...

    Results (257 votes). Check out past polls.