I think protection for verb is quite safe, but nouns are not
encrypted for obvious reason. Thus if you define a verb by put
it into a noun (0 : 0) or linear representation and then derive
the verb by 0!:0 or ". then it is susceptible to attack.

However I suspect security can never be enforced if the script 
file is distributed and run by users, eg, someone can redefine

pwdcheck=: 1:

(untested)

Ср, 05 авг 2015, jprogramming написал(а):
> Dan Bron created a program that reverses 3!:6
> 
> 
> http://www.jsoftware.com/jwiki/DanBron/Temp/Unlock
> 
> but the link to the SVN is dead.
> 
> My main question assuming it comes back, or someone else duplicates it,
> 
> does the unlock script need access to the locked file, or does it do 
> everything in memory?
> 
> Dan alluded that he could attack it in memory with undocumented 15!:6
> 
> The reason I ask is consider this script
> 
> (3!:6 ] 0 : 0) 1!:2 fl =. < jpath '~temp\test.ijl' 
> pwdcheck =: 'password' -: ] 
> )
> 0!:0 fl
> 1!:55 fl
> 
> (erases file after load)
> 
> then
> 
> 
>  pwdcheck 
> pwdcheck 
> 
> 
>  pwdcheck 'password' 
> 1
>  pwdcheck 'not password' 
> 0
> My goal is not the above example.  Its to protect "casually sensitive" 
> information in memory from being snoopable when walking away form computer.
> ----------------------------------------------------------------------
> For information about J forums see http://www.jsoftware.com/forums.htm

-- 
regards,
====================================================
GPG key 1024D/4434BAB3 2008-08-24
gpg --keyserver subkeys.pgp.net --recv-keys 4434BAB3
gpg --keyserver subkeys.pgp.net --armor --export 4434BAB3
----------------------------------------------------------------------
For information about J forums see http://www.jsoftware.com/forums.htm

Reply via email to