| |
All decryption filters work
on the principle of "security through obscurity."
Regardless of how well you write a decryption filter
and how strong your encryption algorithm, anyone
determined enough can retrieve the original source
code. The reason is quite simple - once the
decryption filter has decrypted the source back to
its original form, fragments of it will be stored in
the computer's memory as Perl parses it. The source
might only be in memory for a short period of time,
but anyone possessing a debugger, skill, and lots of
patience can eventually reconstruct your
program.
That said, there are a
number of steps that can be taken to make life
difficult for the potential cracker. The most
important: Write your decryption filter in C and
statically link the decryption module into the Perl
binary. For further tips to make life difficult for
the potential cracker, see the file
decrypt.pm in the source filters
module.
|