Beefy Boxes and Bandwidth Generously Provided by pair Networks
"be consistent"
 
PerlMonks  

Re^8: What happened to perlcc?

by ikegami (Pope)
on Feb 28, 2011 at 22:17 UTC ( #890656=note: print w/replies, xml ) Need Help??


in reply to Re^7: What happened to perlcc?
in thread What happened to perlcc?

And in the home page, perhaps missed, was:

Wasn't missed, just not relevant.

And yes, it's weak encryption

It's encoding, not encryption or obfuscation. There must be a secret for encryption.

So your claim that the source code is provided intact is false.

No, even when a key is specified, the code is provided intact.

Compile the code into an executable

I missed that, thanks.

Replies are listed 'Best First'.
Re^9: What happened to perlcc?
by daveola (Acolyte) on Mar 01, 2011 at 11:40 UTC

      Encryption does NOT require a secret.

      Again? You really should start reading the material to which you reference before contradicting.

      to make it unreadable to anyone except those possessing special knowledge

      To consider ROT13 and perlc to be forms of encryption, one must consider the algorithm itself to be the secret. First rule of encryption: Never consider the algorithm a secret.

      But enough theory. In practice, perlc provides the original intact without knowing either the algorithm or the salt you call "key". Objections over names don't really matter.

          To consider ROT13 and perlc to be forms of encryption,

        To consider ROT13 to be encryption, you have to know the definition of encryption. You choose to ignore it. I can't help you with that.

        I'm sure I'll get more negative reputation for this - someone should probably go to Wikipedia (and every other technical source on the subject) and let them know that Ikegami has redefined encryption and ROT13 no longer counts.

        Furthermore, I don't think we agree on the word intact:

        http://en.wiktionary.org/wiki/intact

        The code is not intact, it is transformed by the key. Whether or not you want to admit that "weak encryption" exists is up to you, but the code is not intact in the executable.

        This is the most ridiculous conversation I've had on the net, and that's saying a lot.

Log In?
Username:
Password:

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://890656]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this? | Other CB clients
Other Users?
Others scrutinizing the Monastery: (5)
As of 2020-11-28 19:35 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    No recent polls found

    Notices?