??? 10/11/05 14:26 Read: times |
#102224 - security through obscurity Responding to: ???'s previous message |
Erik Malund said:
Nevertheless, if the OP is not intent on stealing, whomever else may have such intent now has the recipe. From the OP question I understood he is not sure whether somebody else ("one") can read out his code from the ADuC or is it protected well enough. I think it is fair to bring up possible security flaws. While we agreed on another thread that absolute security does not exist, there is no point investing in a product that can be copied too easily. And, there is nothing gained by security through obscurity - if there IS an obvious security hole which is trivial=cheap to exploit, from almost every aspect it is better to bring it to public. An another view: what I wrote is so evident that there is no need to disguise it. Still I have not tried so I cannot say if it would work or not and how would the security bits interact with something like this. Jan Waclawek |
Topic | Author | Date |
read out from ADUC842 | 01/01/70 00:00 | |
Why? | 01/01/70 00:00 | |
why not? you can verify the downloading | 01/01/70 00:00 | |
Aha! | 01/01/70 00:00 | |
write a "bootloader stub"? | 01/01/70 00:00 | |
Do you really want to support som | 01/01/70 00:00 | |
Don't take the OP too seriously! | 01/01/70 00:00 | |
When stealing may be the issue, I choose | 01/01/70 00:00 | |
security through obscurity | 01/01/70 00:00 | |
such will be immenely helped by your pos | 01/01/70 00:00 | |
the bungling amateurs...![]() | 01/01/70 00:00 |