From: Federica Germano on
Hi,

I would like to know if it is possible to hide a new generated script or function in such a way that a user could be able to use it but not to see inside it.

If it is possible can anyone explain me how?

Thank you very much!

Federica Germano
From: Andy on
"Federica Germano" <federica_germano(a)yahoo.it> wrote in message <i2pilc$fmc$1(a)fred.mathworks.com>...
> Hi,
>
> I would like to know if it is possible to hide a new generated script or function in such a way that a user could be able to use it but not to see inside it.
>
> If it is possible can anyone explain me how?
>
> Thank you very much!
>
> Federica Germano

How secure do you want to make it? You can p-code it, for example. But I recall previous discussions on this newsgroup concluding that p-coding isn't actually that secure.
From: Federica Germano on
"Andy " <myfakeemailaddress(a)gmail.com> wrote in message <i2pjdo$63e$1(a)fred.mathworks.com>...
> "Federica Germano" <federica_germano(a)yahoo.it> wrote in message <i2pilc$fmc$1(a)fred.mathworks.com>...
> > Hi,
> >
> > I would like to know if it is possible to hide a new generated script or function in such a way that a user could be able to use it but not to see inside it.
> >
> > If it is possible can anyone explain me how?
> >
> > Thank you very much!
> >
> > Federica Germano
>
> How secure do you want to make it? You can p-code it, for example. But I recall previous discussions on this newsgroup concluding that p-coding isn't actually that secure.

I've just tried. Do you think it is possible to decript it?
Thankyou. Federica
From: Jan Simon on
Dear Federica,

> I've just tried. Do you think it is possible to decript it?

If I spent a bunch of hours, I will find out in detail, what is processed in the function step by step. The question is, if it is a benefit for anybody to pay this working time to analyse your code. A simple calculation:
If I need 20 hours a 100$ for the analysis for a highly tricky work, it might be easier and cheaper to pay you 1000$ for the source code.

Kind regards, Jan
From: Walter Roberson on
Federica Germano wrote:
> "Andy " <myfakeemailaddress(a)gmail.com> wrote in message

>> How secure do you want to make it? You can p-code it, for example.
>> But I recall previous discussions on this newsgroup concluding that
>> p-coding isn't actually that secure.

> I've just tried. Do you think it is possible to decript it?

Yes, I think it is possible to decode .p files into meaningful code (that will
not necessarily look _exactly_ the same as the original code.)

However, as the other poster alluded to, doing so would *usually* take more
effort than it was worth. Easier to find a way to remotely control the
computer you have the source on.