Note that there are some explanatory texts on larger screens.

plurals
  1. PO
    primarykey
    data
    text
    <p>Since you're trying to hide text, which will be visible in the simple dump of the program, you can use some kind of simple encryption to obfuscate your program and hide that text from prying eyes. </p> <h3>Detailed instuctions:</h3> <ol> <li>Visit <a href="http://ROT13.com" rel="nofollow noreferrer">ROT47.com</a> and encode your text online. You can also use <a href="http://www.senses0.org.mv/popzees/rot/rotn.php" rel="nofollow noreferrer">this web site</a> for a more generic ROTn encoding.</li> <li>Replace contents of your string constants with the encoded text.</li> <li>Use the decoder in your code to transform the text back into its original form when you need it. <a href="http://en.wikipedia.org/wiki/ROT13#Implementation" rel="nofollow noreferrer">ROT13 Wikipedia article</a> contains some notes about implementation, and here is <a href="https://stackoverflow.com/questions/3408586/need-a-rot47-javascript-implementation">Javascript implementation of ROTn</a> on StackOverflow. It is trivial to adapt it to whatever language you're using.</li> </ol> <h3>Why use ROT47 which is notoriously weak encryption?</h3> <p>In the end, your code will look something like this:</p> <blockquote> <p>decryptedData = decryptStr(MY_ENCRYPTED_CONSTANT)<br> useDecrypted(decryptedData)</p> </blockquote> <p>No matter how strong your cypher, anybody equipped with a debugger can set a breakpoint on <code>useDecrypted()</code> and recover the plaintext. So, strength of the cypher does not matter. However, using something like Rot47 has two distinct advantages:</p> <ol> <li>You can encode your text online, no need to write a specialized program to encode your text.</li> <li>Decryption is very easy to implement, so you don't waste your time on something that does not add any value to your customers.</li> <li>Anybody reading your code (your coworker or yourself after 5 years) will know immediately this is not a real security, but security by obscurity.</li> <li>Your text will still appear as gibberish to anyone just prying inside your compiled program, so mission accomplished.</li> </ol>
    singulars
    1. This table or related slice is empty.
    plurals
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. VO
      singulars
      1. This table or related slice is empty.
    2. VO
      singulars
      1. This table or related slice is empty.
    3. VO
      singulars
      1. This table or related slice is empty.
 

Querying!

 
Guidance

SQuiL has stopped working due to an internal error.

If you are curious you may find further information in the browser console, which is accessible through the devtools (F12).

Reload