Talk:Obfuscating software

From Wikipedia, the free encyclopedia

The part about "Code Morphing" being NP-hard seems like confusing technobabble. What exactly is the specification of the "code restoration" problem that is NP-hard, and is code restoration really the Holy Grail to "breaking" software? (Breaking RSA certainly doesn't involve any sort of code restoration, and it seems it's not even NP-complete...) Bi 13:17, 30 March 2006 (UTC)

[edit] Merge

Good idea NLOleson 22:38, 20 August 2006 (UTC)

I agree. Chapium 20:33, 10 November 2006 (UTC)

[edit] First sentence seems wrong

I am no CS expert, but the following sentence seems illogical to me: "Obfuscating software...designed to inhibit reverse engineering of software even when source code is available." If the source code is available, why would you need to reverse-engineer the program in the first place? Isn't the whole purpose of reverse engineering to create source code from a running program?