Different approach,

Don't obfuscate your code, give them the entire source code.
Then attach a restrictive usage license.

Then hope that they ignore the license and intergrate your code into their
critical systems.
Then audit their site a few years on, determine if your license has been
breached and have some interesting discussions over litigation or
retrospective licensing fees.

Isn't that how the big boys do it these days?

Reply via email to