I'm informed that malware authors often go to some lengths to prevent
their software from being disassembled.  Could they use Palladium for
this end?  Are there any ways in which the facilities that Palladium
and TCPA provide could be useful to a malware author who wants to
frustrate legitimate attempts to understand and defeat their software?
-- 
  __  Paul Crowley
\/ o\ [EMAIL PROTECTED]
/\__/ http://www.ciphergoth.org/

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to