Beefy Boxes and Bandwidth Generously Provided by pair Networks
There's more than one way to do things

Re^7: Why is it bad to hide the source?

by daveola (Acolyte)
on Feb 28, 2011 at 21:53 UTC ( #890650=note: print w/replies, xml ) Need Help??

in reply to Re^6: Why is it bad to hide the source?
in thread Why is it bad to hide the source?

I recognize that I am using a weak encryption,...

ACME::Bleach is obfuscation rather than encryption.


Fortunately I'm not talking about Bleach, I'm talking about the weak encryption that is built into perlc.

It's amazing how many times I have to state this.

Various people have pointed out your "truths" may be misunderstandings

Ironically it's the other way around. It's interesting as well that people such as yourself are more willing to trust the claims made by ikegami, rather than to either trust the claims or the author, or, better yet, check for yourself.

Search for 'key'

Or look at the source and/or run the usage:

  • Comment on Re^7: Why is it bad to hide the source?

Replies are listed 'Best First'.
Re^8: Why is it bad to hide the source?
by marto (Archbishop) on Feb 28, 2011 at 22:31 UTC

    "Fortunately I'm not talking about Bleach, I'm talking about the weak encryption that is built into perlc."

    Again, this isn't encryption. You are misleading people into believe it is so. And more of the same here.

      This isn't encryption?

      Either you don't understand what the software does or we are using different definitions of "encryption".. I will look to Wikipedia:

      As a further example, considered the *far* weaker encryption done by Rot13 (a subset of the encryption I use). If we again look to Wikipedia:

      We will see:

      " often cited as a canonical example of weak encryption...ROT13 is an example of the encryption algorithm known as a Caesar cipher" And so on and so forth...

      If ROT13 is encryption, which the rest of the world seems to agree with me on, then my encoding is encryption even more so, as ROT13 is essentially my encryption with a constant key.

      So.... It is encryption, whether you want it to be or not.

      Who is misleading who? We have to get all the way down to Re^9 and I am still presenting only facts, and I'm still being called misleading.

      Very frustrating.

      Please check your facts sir, I have checked mine, many times.

        Over the course of this thread and What happened to perlcc?, much has been said. The simple fact with the 'encryption' you claim to offer, the source can be determined fairly easily, without knowing the 'encrpytion' algorithm or the salt used. See Re^15: What happened to perlcc? and subsequent posts explaining how this can be achieved with access to the binary only or the .c file produced.

Log In?

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://890650]
and the web crawler heard nothing...

How do I use this? | Other CB clients
Other Users?
Others cooling their heels in the Monastery: (4)
As of 2020-04-07 14:52 GMT
Find Nodes?
    Voting Booth?
    The most amusing oxymoron is:

    Results (42 votes). Check out past polls.