Skip to main content

Questions tagged [obfuscation]

0 votes
2 answers
239 views

Problem: There are proprietary algorithms that developers who are actively working on a project will need to call but they should not see the underlying logic. They need to be stored in an area of ...
Rudazzle's user avatar
  • 111
-2 votes
1 answer
68 views

I have a website that was writing using .net stack technologies. It is accessible via the internet. Some of my potential (Enterprise) customers want me to install the whole website on their own VM and ...
Sanprof's user avatar
  • 107
-5 votes
2 answers
335 views

We have developed an algorithm that processes some data at runtime and is slight efficient in terms of time and computing compared with other solutions out there. Though we sure anyone can develop a ...
software_dev's user avatar
2 votes
1 answer
2k views

TL;DR How do you build an airtight license control system for your onprem application, which revokes access once subscription ends? Premise I am building this application in Python that needs to ...
arvindkgs's user avatar
  • 129
0 votes
2 answers
886 views

I have a project which involves using C++ files along with an API on a local PC to communicate with a remote server app, and for sake of maintaining a semblance of non-disclosure with any hired ...
CB001's user avatar
  • 19
0 votes
1 answer
214 views

If I have a private key with which I sign byte code, and a public key with which I can decipher the signed code to verify its authenticity, can I protect that byte code from being reverse engineered ...
user2800708's user avatar
30 votes
8 answers
9k views

The title says it all, the more I do research about piracy and the tools used to crack an app the more I think it is just wasted time. My biggest threat is that my app is being cracked and uploaded ...
Mike's user avatar
  • 446
2 votes
1 answer
9k views

I am working on a collaborative project, for which I have to submit source code, which will be used/embedded in the main repository for re-compilation. Is there any way, I can encrypt the source code ...
Qasim's user avatar
  • 133
1 vote
2 answers
984 views

Let's say I have a database-driven web application written in PHP. After obfuscating the code with PHP protect it will be copied to a web hosting server. And here is the question. What is the ...
xralf's user avatar
  • 573
2 votes
1 answer
4k views

I stumbled across polymorphic engines and I don't know anything about them. However, I am curious about how they are written. Every example that I've looked up writes them in assembly, my assembly is ...
Hawk's user avatar
  • 361
2 votes
1 answer
249 views

Some applications (for example Minecraft) have the 'free-to-deobfuscate'-model. It means that you are free to make and distribute changes to the applications code, but you must decompile and ...
jobukkit's user avatar
  • 217
3 votes
2 answers
4k views

I'm interested in doing code obfuscation (native code, to make it clear what I mean by "native code": the actual machine code in x86/x64/arm executable files - PE, ELF, Macho and etc, not the sources) ...
user2102508's user avatar
-1 votes
1 answer
577 views

I've heard ProGuard's Jar shrinker affects the performance of you application. Is this true? And if so just how much slower does the Jar go shrinked compared to unshrinked?
user1870398's user avatar
6 votes
3 answers
24k views

See top answer here: Obfuscation at source-code level more effective than obfuscators?, specifically "Code it in a language so not easy to decompile such as C/C++" I'm looking to write a new ...
Michael's user avatar
  • 483
7 votes
4 answers
49k views

I'd like to ask how to protect my code that is running on a client server from being altered and/or copied. It's running on Ubuntu Server with the standard Apache Php Mysql stack. Any software needed ...
HTDutchy's user avatar
  • 222

15 30 50 per page