I think protection for verb is quite safe, but nouns are not encrypted for obvious reason. Thus if you define a verb by put it into a noun (0 : 0) or linear representation and then derive the verb by 0!:0 or ". then it is susceptible to attack.
However I suspect security can never be enforced if the script file is distributed and run by users, eg, someone can redefine pwdcheck=: 1: (untested) Ср, 05 авг 2015, jprogramming написал(а): > Dan Bron created a program that reverses 3!:6 > > > http://www.jsoftware.com/jwiki/DanBron/Temp/Unlock > > but the link to the SVN is dead. > > My main question assuming it comes back, or someone else duplicates it, > > does the unlock script need access to the locked file, or does it do > everything in memory? > > Dan alluded that he could attack it in memory with undocumented 15!:6 > > The reason I ask is consider this script > > (3!:6 ] 0 : 0) 1!:2 fl =. < jpath '~temp\test.ijl' > pwdcheck =: 'password' -: ] > ) > 0!:0 fl > 1!:55 fl > > (erases file after load) > > then > > > pwdcheck > pwdcheck > > > pwdcheck 'password' > 1 > pwdcheck 'not password' > 0 > My goal is not the above example. Its to protect "casually sensitive" > information in memory from being snoopable when walking away form computer. > ---------------------------------------------------------------------- > For information about J forums see http://www.jsoftware.com/forums.htm -- regards, ==================================================== GPG key 1024D/4434BAB3 2008-08-24 gpg --keyserver subkeys.pgp.net --recv-keys 4434BAB3 gpg --keyserver subkeys.pgp.net --armor --export 4434BAB3 ---------------------------------------------------------------------- For information about J forums see http://www.jsoftware.com/forums.htm
