Beefy Boxes and Bandwidth Generously Provided by pair Networks
Do you know where your variables are?

Re^28: Perl 6 ... dead? (no, just convalescing)

by jryan (Vicar)
on Sep 03, 2004 at 22:56 UTC ( #388443=note: print w/ replies, xml ) Need Help??

in reply to Re^27: Perl 6 ... dead? (no, just convalescing)
in thread Perl 6 ... dead?

I didn't suggest that the key be hidden inside the VM. I suggested that it be entered by the users, every time the encrypted program was run; hence the "it would be a huge pain in the ass to users" part. :)

Comment on Re^28: Perl 6 ... dead? (no, just convalescing)
Replies are listed 'Best First'.
Re^29: Perl 6 ... dead? (no, just convalescing)
by Aristotle (Chancellor) on Sep 03, 2004 at 23:09 UTC

    Well, that would be trivial to "break" from the onset, since the algorithm is known and the key is also known.

    Makeshifts last the longest.

      Right, it would have the same vulnerabilities that "Enter Serial Number to Install" software does now.

        You guys going for the record on depth or something?

Log In?

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://388443]
and the web crawler heard nothing...

How do I use this? | Other CB clients
Other Users?
Others chilling in the Monastery: (8)
As of 2015-12-01 05:48 GMT
Find Nodes?
    Voting Booth?

    What would be the most significant thing to happen if a rope (or wire) tied the Earth and the Moon together?

    Results (794 votes), past polls