I know this topic has historically been discussed quite a bit and I don't want to start another long discussion, but here is my high-level goal:
The law department asked me to build an executable such that if somebody did find a way to re-create the original source code, it could be shown to a judge that it wasn't an accidental thing, but something they did on purpose.
Building an executable with PAR without using a filter means that someone could accidentally stumble over the source code in the cache directory that is generated in %TEMP% after it is run for the first time. I felt something further needed to be done.
Using PAR::Filter::Bleach seems to satisfy this requirement, but I thought that using PAR::Filter::Crypto would even be better. So I tried to learn about both. |