Hal Fulton wrote:
> Kris Leech wrote:
>> Well there are several aspects to this, I want to protect the code 
>> from being read, from being modified and from internal attacks.
>>
>> I could use the file system permissions but its always vunrable to at 
>> least one person. This normally would not be a problem but we are 
>> dealing with sensative data.
>>
>> We can make the encrypt key in the interpreter hard to find, not 
>> impossible, but much more secure than having open source code.
> 
> Google for the phrase "security through obscurity" (STO).
There's a useful difference between full security and a picket fence. 
Sure, a picket fence is easy to get over, but you know you're 
trespassing (and legally have shown intent) when you do.

-- 
Alex