Thiago Damas wrote:
And if you make a wrapper, and execute like a shell script:
#!/usr/local/bin/mysecyritywrapper
<...encryted code goes where...>
In this way. it'll be hard to use truss, ktrace, strace etc...
No, not really. All of those tools can trace through
to sub-processes, so whenever the code gets decrypted and
starts executing (whether it's in the main process or
in a sub-process), they'll be able to follow the system
calls it makes.
The key fact about DRM is that it is theoretically
impossible. Of course, that's what makes it such
an interesting problem in practice. ;-)
Cheers,
Tim Kientzle
_______________________________________________
freebsd-hackers@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"