??? 02/25/08 21:13 Read: times |
#151449 - Encryption Responding to: ???'s previous message |
Erik Malund said:
Have you ever tried to reconstruct something from a .hex file? you are far better off starting from scratch. Of course, if you have security info or some such thing, the story differ, pray tell why you want this. Sometimes it's more of a customer requirement than a technical benefit. I have a customer right now that needs us to encrypt communication between our 8052-based firmware and an Internet server (over a GPRS modem)--mostly just so he can tell the users of the product that the data is encrypted... not that neither he nor I believe anyone would ever want the data to start with, but it's what many people want to hear. I do agree with you, though. You have to assume that anyone that wants your code will get it. You need to provide value elsewhere which will separate you from the thief of your code. Regards, Craig Steiner |
Topic | Author | Date |
Secure IAP (In Application Programming) | 01/01/70 00:00 | |
It is not THAT important | 01/01/70 00:00 | |
Encryption | 01/01/70 00:00 | |
not necessarily | 01/01/70 00:00 | |
2 minutes? | 01/01/70 00:00 | |
Encryption worth it? | 01/01/70 00:00 | |
the philosophical thread continued | 01/01/70 00:00 | |
if you want to make it really painful ...![]() | 01/01/70 00:00 | |
ansered by e-mail | 01/01/70 00:00 | |
the balancing act | 01/01/70 00:00 | |
there is little difference... | 01/01/70 00:00 | |
bootloader | 01/01/70 00:00 | |
On a SiLabs F02x or similar | 01/01/70 00:00 | |
it's the same on other derivatives, too... | 01/01/70 00:00 |