This is a huge benefit for 4D—isn’t it nearly impossible to reverse-engineer a
compiled 4D structure? I’m not a hacker but that’s been my assumption all
these years. It’s boiled down to machine code and nearly impossible to figure
out the source from the compiled app—yes?
Thanks,
Robert
> On
Obfuscation is the only reliable option with JavaScript. There are tools
that “encrypt” the text but they have significant overhead.
By definition, JS is text, interpreted. There are JavaScript compilers that
sit on JVM. Mixed reviews for all.
- CSW
On Sat, Jul 14, 2018 at 12:39 AM Robert ListMa
There is not much you can do. Javascript can be minimized and obfuscated, but
there are plenty of tools to reverse that.
John DeSoi, Ph.D.
> On Jul 13, 2018, at 11:38 PM, Robert ListMail via 4D_Tech
> <4d_tech@lists.4d.com> wrote:
>
> One of the beauties of 4D is that the source code can be d
One of the beauties of 4D is that the source code can be delivered in a
compiled form which more than obfuscates the code. So, if you have a full
JavaScript stack application running on the customers server, not merely hosted
solution, how can the source code (mostly JS) be protected?
Thanks,
4 matches
Mail list logo