Skip to main content
9 events
when toggle format what by license comment
Jul 5, 2014 at 13:10 history edited Anko CC BY-SA 3.0
Grammar and formatting. Some wording clarifications.
Feb 15, 2012 at 11:55 comment added kaoD This is a very good example of en.wikipedia.org/wiki/Security_through_obscurity
Feb 15, 2012 at 8:33 comment added o0'. This is a terribly weak technique, which will give to the developers a very false sense of security.
Oct 6, 2010 at 17:06 comment added Ellis Yes, i know it. In france, we do the same in few engineering schools. It is the same problem as copy protection. It it not the perfect solution. But in many cases, it is sufficient. My opinion because i made just little games.
Oct 6, 2010 at 12:49 comment added user744 A standard undergraduate exercise, at least in US universities, is to reverse-engineer passwords constructed as you describe, by reading y86 (cgi2.cs.rpi.edu/~hollingd/comporg-spring2007/notes/Y86/…) assembly code.
Oct 4, 2010 at 12:10 vote accept teedyay
Oct 1, 2010 at 18:18 comment added Ellis This is an Android Application in native C++. There is no symbol, nor good debugger available. So you can read the ARM code, but not trace it easily. The key is composed by multiple operations so find all strings is not sufficient. That is not perfect but quite painful.
Oct 1, 2010 at 10:46 comment added Kylotan I'm quite dubious that reverse engineering to find your magic string would be all that difficult.
Sep 30, 2010 at 15:50 history answered Ellis CC BY-SA 2.5