On 29 Aug 2002, Paul Crowley wrote:

>I'm informed that malware authors often go to some lengths to prevent
>their software from being disassembled.  Could they use Palladium for
>this end?  Are there any ways in which the facilities that Palladium
>and TCPA provide could be useful to a malware author who wants to
>frustrate legitimate attempts to understand and defeat their software?

If it provides the protections that copy-protection groups want
(ie, it can be used to prevent keys in their software from being
read by other software) then yes, it can be used to prevent any
code from being read by any software.

                                Bear



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to