in reply to Re: Blending perl and C (two approaches)
in thread Blending perl and C (two approaches)
I hear you loud and clear!
Actually the data can be made completely public. It is the method whereby it is gathered and organized that requires protection. Essentially we have to create a barrier that shows the program was tampered with if the results are wrong. Think of the law: If your door is unlocked then the burglar will probably be in less trouble than if he has to break something to get in.
The protection need not be perfect becasue the potential hacker base is small and NTTB (Not Too Terribly Bright)
In any event, to all of you, the comments are really valuable. I am impressed with the genuine interest each of your responses show. I am proud to belong to this organization.