Talk:Obfuscating software
From Wikipedia, the free encyclopedia
The part about "Code Morphing" being NP-hard seems like confusing technobabble. What exactly is the specification of the "code restoration" problem that is NP-hard, and is code restoration really the Holy Grail to "breaking" software? (Breaking RSA certainly doesn't involve any sort of code restoration, and it seems it's not even NP-complete...) Bi 13:17, 30 March 2006 (UTC)
[edit] Merge
Good idea NLOleson 22:38, 20 August 2006 (UTC)
I agree. Chapium 20:33, 10 November 2006 (UTC)
[edit] First sentence seems wrong
I am no CS expert, but the following sentence seems illogical to me: "Obfuscating software...designed to inhibit reverse engineering of software even when source code is available." If the source code is available, why would you need to reverse-engineer the program in the first place? Isn't the whole purpose of reverse engineering to create source code from a running program?