Hacker News new | past | comments | ask | show | jobs | submit login

If it runs, it has to be decrypted (at a current level of cryptography); at most it is obfuscated and the access is blocked by some hardware tricks which may be costly to circumvent, but there is nothing fundamental stopping you.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: