On 05/26/10 01:09, Adam Tauno Williams wrote: > On Tue, 2010-05-25 at 18:49 +0500, Sandy Ydnas wrote: >> Agree, reveres engineering is crucial issuer for programming >> language >> but every executable file can be cracked, for example by using >> disassembler!!! >> For each weapon there is antiweapon, so >> is it possible to prevent reveres engineering when customer have >> access to executable made from Python code??? > > No. But you can make it hard. > > Store a GPG encrypted blob in your program that contains you secret > sauce, is decrypted to memory, executed, and then discarded. Setup > some kind of license manager like dongle or application to perform the > key management.
That merely gives a false sense of security. If the program is decrypted in memory, you can easily make a memory dump to get the unencrypted program. If I am a competitor that can make economic advantage by cracking your secret sauce, it wouldn't be difficult for me to do that. -- http://mail.python.org/mailman/listinfo/python-list