If you're writing something and marketing it (even if it's just to your boss) as secure, this is a poor security approach indeed, but if all you want to do is deter or make the user/enemy use up resources in order to work around it, this could be sufficient.
In reply to RE: RE: RE: Re: peeking at the working interpreter
by Fastolfe
in thread peeking at the working interpreter
by gregorovius
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |