Beefy Boxes and Bandwidth Generously Provided by pair Networks
more useful options
 
PerlMonks  

Re^9: Why is it bad to hide the source?

by daveola (Acolyte)
on Mar 01, 2011 at 11:29 UTC ( #890723=note: print w/replies, xml ) Need Help??


in reply to Re^8: Why is it bad to hide the source?
in thread Why is it bad to hide the source?

This isn't encryption?

Either you don't understand what the software does or we are using different definitions of "encryption".. I will look to Wikipedia:

http://en.wikipedia.org/wiki/Encryption

As a further example, considered the *far* weaker encryption done by Rot13 (a subset of the encryption I use). If we again look to Wikipedia:

http://en.wikipedia.org/wiki/Rot13

We will see:

"ROT13..is often cited as a canonical example of weak encryption...ROT13 is an example of the encryption algorithm known as a Caesar cipher" And so on and so forth...

If ROT13 is encryption, which the rest of the world seems to agree with me on, then my encoding is encryption even more so, as ROT13 is essentially my encryption with a constant key.

So.... It is encryption, whether you want it to be or not.

Who is misleading who? We have to get all the way down to Re^9 and I am still presenting only facts, and I'm still being called misleading.

Very frustrating.

Please check your facts sir, I have checked mine, many times.

  • Comment on Re^9: Why is it bad to hide the source?

Replies are listed 'Best First'.
Re^10: Why is it bad to hide the source?
by marto (Archbishop) on Mar 03, 2011 at 12:55 UTC

    Over the course of this thread and What happened to perlcc?, much has been said. The simple fact with the 'encryption' you claim to offer, the source can be determined fairly easily, without knowing the 'encrpytion' algorithm or the salt used. See Re^15: What happened to perlcc? and subsequent posts explaining how this can be achieved with access to the binary only or the .c file produced.

Re^10: Why is it bad to hide the source?
by Anonymous Monk on Mar 01, 2011 at 11:38 UTC
      And?

      If I give you an executable, can you extract the source? I'd love to see that.

        And?

        What do you mean and? Your own words say encoding, not weak encryption, but encoding :D

        If I give you an executable, can you extract the source? I'd love to see that.

        I could (filealyzer,peexplorer,objdump....), but I'm not a monkey

        ;P

Log In?
Username:
Password:

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://890723]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this? | Other CB clients
Other Users?
Others romping around the Monastery: (3)
As of 2020-04-03 05:52 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?
    The most amusing oxymoron is:
















    Results (26 votes). Check out past polls.

    Notices?