Over the course of this thread and What happened to perlcc?, much has been said. The simple fact with the 'encryption' you claim to offer, the source can be determined fairly easily, without knowing the 'encrpytion' algorithm or the salt used. See Re^15: What happened to perlcc? and subsequent posts explaining how this can be achieved with access to the binary only or the .c file produced.
In reply to Re^10: Why is it bad to hide the source?
by marto
in thread Why is it bad to hide the source?
by z0d
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |