Quoteing djberg96 / hotmail.com, on Thu, Jun 03, 2004 at 12:33:48AM +0900:
> >On Wed, 2 Jun 2004, David A. Black wrote:
> 
> >> This is probably a stupid question, but... what if someone did:
> >> 
> >>   ruby -e 'require "crypt/fog"; puts
> eval(Crypt::Fog.decrypt(......)'
> 
> Well, you happen to know the method and the salt with which to decrypt
> the example I gave you.  Besides, the OP only hasked for obfuscation,
> not encryption.
> 
> Let's have a little fun. I'll give you some obfuscated code and you
> tell me how long it takes you to decipher it.
> 
> \255\257\244\265\254\245`\215\257\266\251\245J```\243\254\241\263\263`\203\250\262\251\263\264\255\241\263\223\264\257
> \262\271J``````\244\245\246`\263\245\243\262\245\264\237\255\245\263\263\241\247\245J`````````\260\265\264\263`b\202\2
> 45`\263\265\262\245`\264\257`\244\262\251\256\253`\271\257\265\262`\217\266\241\254\264\251\256\245bJ``````\245\256\24
> 4J```\245\256\244J\245\256\244JJ\243\263`}`\215\257\266\251\245zz\203\250\262\251\263\264\255\241\263\223\264\257\262\
> 271n\256\245\267J\243\263n\263\245\243\262\245\264\237\255\245\263\263\241\247\245

Not fair.  Send me a working example of it running, as you would do if
you ship me an application, and it might be very easy.

Building the encryption key into the ruby binary would work a little
better, you could try and hide the key bits in various places, which
would make it harder to reverse engineer.

Cheers,
Sam