On 05/26/10 01:09, Adam Tauno Williams wrote:
> On Tue, 2010-05-25 at 18:49 +0500, Sandy Ydnas wrote:
>> Agree, reveres engineering is crucial issuer  for programming
>> language 
>> but every executable file can be cracked, for example  by using
>> disassembler!!! 
>> For each weapon there is antiweapon, so
>> is it possible to prevent reveres engineering when customer have
>> access to executable made from Python code???
> 
> No.  But you can make it hard.
> 
> Store a GPG encrypted blob in your program that contains you secret
> sauce, is decrypted to memory, executed, and then discarded.    Setup
> some kind of license manager like dongle or application to perform the
> key management.

That merely gives a false sense of security. If the program is decrypted
in memory, you can easily make a memory dump to get the unencrypted
program. If I am a competitor that can make economic advantage by
cracking your secret sauce, it wouldn't be difficult for me to do that.
-- 
http://mail.python.org/mailman/listinfo/python-list

Reply via email to