From: jim bell <jimbell@pacifier.com>
To: stevenw@best.com (Steven Weller)
Message Hash: bd94e5b4b635a3e1e175c694e85b66b14000ecaef7ab256f105ab4a02cf0fc20
Message ID: <m0tTFzL-0008y5C@pacifier.com>
Reply To: N/A
UTC Datetime: 1995-12-22 23:38:20 UTC
Raw Date: Sat, 23 Dec 1995 07:38:20 +0800
From: jim bell <jimbell@pacifier.com>
Date: Sat, 23 Dec 1995 07:38:20 +0800
To: stevenw@best.com (Steven Weller)
Subject: Re: ex encrypted script
Message-ID: <m0tTFzL-0008y5C@pacifier.com>
MIME-Version: 1.0
Content-Type: text/plain
At 11:20 PM 12/21/95 -0800, you wrote:
difficult for the amateur attacker.
>>
>>A tale I hear is that when HP had to deliver operating system source to
>>the french government they stripped all comments and changed all variable
>>and subroutine names to 32 byte strings of I 1 0 (zero) and O (uppercase O).
>>It still compiled but was 100% useless to human readers.
>
>There is a commercial product out there from Gimpel Software called _The C
>Shroud_. It removes all structure from the code, replacing it with gotos,
>renames all the symbols to axxxxxxx, converts constants and strings to hex,
>substitutes all #defines and expands all macros, strips all formatting and
>comments, etc., resulting in a perfectly compilable, but infuriatingly
>obfuscated set of source files.
>Steven Weller
On the other hand, there are some programmers out there whose work product
makes such a product totally redundant!
Return to December 1995
Return to “jim bell <jimbell@pacifier.com>”
1995-12-22 (Sat, 23 Dec 1995 07:38:20 +0800) - Re: ex encrypted script - jim bell <jimbell@pacifier.com>