If you
are encrypting keys then it seems to me that you are also including in some
form, the code that will encrypt and decrypt them in your application.At what
point can a hacker discover the code in your application that enables them to
decrypt your keys?
|
- [DUG]: Software Expiry Codes - OnGuard David Brennan
- RE: [DUG]: Software Expiry Codes - OnGuard Max Nilson
- Re: [DUG]: Software Expiry Codes - OnGuard David Brennan
- Re: [DUG]: Software Expiry Codes - OnGuard Mark Howard
- RE: [DUG]: Software Expiry Codes - OnGuard Patrick Dunford
- RE: [DUG]: Software Expiry Codes - OnGuard Peter Hyde
- RE: [DUG]: Software Expiry Codes - OnGuard Max Nilson
- RE: [DUG]: Software Expiry Codes - OnGuard Peter Hyde
- RE: [DUG]: Software Expiry Codes - OnGuard David O'Brien
- RE: [DUG]: Software Expiry Codes - OnGuard Martin Paulo
- RE: [DUG]: Software Expiry Codes - OnGuard Max Nilson
- RE: RE: [DUG]: Software Expiry Codes - OnGuard Jason L. Coley