By using this site, you agree to our updated Privacy Policy and our Terms of Use. Manage your Cookies Settings.
440,626 Members | 1,146 Online
Bytes IT Community
+ Ask a Question
Need help? Post your question and get tips & solutions from a community of 440,626 IT Pros & Developers. It's quick & easy.

How to avoid reverse code engineering of a python executable

P: n/a
Hi guy's,

Couple of day's ago I asked for your help on how to create a single
file of a python executable. Now I want to proceed a little bit
further asking how can I avoid (or at least make it difficult) for
some one to extract my code by using reverse code engineer techniques?
I came on pyobfuscate but I would like more suggestions and guide to
achieve the most possible security in this matter.

Regards,
Nicoals.

Aug 8 '07 #1
Share this Question
Share on Google+
2 Replies


P: n/a
On Wed, 08 Aug 2007 11:40:28 +0000, NicolasG wrote:
Couple of day's ago I asked for your help on how to create a single
file of a python executable. Now I want to proceed a little bit
further asking how can I avoid (or at least make it difficult) for
some one to extract my code by using reverse code engineer techniques?
I came on pyobfuscate but I would like more suggestions and guide to
achieve the most possible security in this matter.
Just don't deliver the code at all but provide a webservice.

Everything else can be reverse engineered and possibly will be if it is
worth the trouble.

Ciao,
Marc 'BlackJack' Rintsch
Aug 8 '07 #2

P: n/a
NicolasG <ni******@gmail.comwrites:
Now I want to proceed a little bit further asking how can I avoid
(or at least make it difficult) for some one to extract my code by
using reverse code engineer techniques? I came on pyobfuscate but I
would like more suggestions and guide to achieve the most possible
security in this matter.
The best possible security is to examine and change the threat model.

Why are you treating the code recipient as the bad guy? In other
words, why do you care whether the recipient reverse engineers the
program? Whatever effort you put into obfuscation, you can't prevent
even a mildly interested attacker from reverse engineering a program
they have in their posession.

--
\ "Laugh and the world laughs with you; snore and you sleep |
`\ alone." -- Anonymous |
_o__) |
Ben Finney
Aug 8 '07 #3

This discussion thread is closed

Replies have been disabled for this discussion.