<shameless_product_plug>
nitrolm.com has a new feature I'm working on that allows you to
encrypt flex/AIR <mx:ModuleLoader> swfs using public/private keys. 
You write a modular application (or just put most everything in one
module). After that, encrypt using NitroLM's AssetEncrypter tool and
change your tags to <nitrolm:EncryptedModuleLoader>.  

The code in the module is protected from decompiling because the
decryption key is stored on the nitrolm server cluster and only
delivered to the client after a valid NitroLM authentication.

I will be at 360 flex in San Jose, so if you want to see it in action,
stop by the Simplified Logic booth.
</shameless_product_plug>

The advantage I see in doing true encryption over obfuscation is that
the code the user runs is the same that you developed.  With
obfuscation, you have to worry about bugs introduced by the obfuscator
and cryptic stack traces to figure out when runtime errors do happen
to occur.

-Andrew

--- In [email protected], "Cato Paus" <[EMAIL PROTECTED]> wrote:
>
> 
> Hello again everyone, how can we protect our code?
> 
> How should we go forward in order to protect the methods used to change
> the senistive information on user data, some blogs on this?
> 
> I found one at a remote-finfig.xml and the use of session id
> 
>
http://www.flexpasta.com/index.php/2008/03/18/flex-using-blazeds-with-ja\
> va-do-you-care-about-security/
>
<http://www.flexpasta.com/index.php/2008/03/18/flex-using-blazeds-with-j\
> ava-do-you-care-about-security/>
> this is good to have this thread hope we can work together to find out
> of this :)
> 
> --- In [email protected], "jmfillman" <jmfillman@> wrote:
> >
> > Has anyone had experience using SWC Encrypt 2.0, by Amayeta? Does it
> > work, or would I just be wasting my money? I'm trying to protect a
> > component I plan to sell, but given the prevalence of de-compilers,
> I'm
> > hesitant to release it. I don't want to see all my hard work stolen.
> >
>


Reply via email to