On Friday 29 August 2008 06:41 am, Michael Morin wrote:
> If a "hacker" has write access to your end user's files (including the 
> program you gave them), they can change it however they want.  There's 
> nothing you can do there.  There are some methods involving 
> cryptographically signed binaries and such, but there are always way 
> around it.

Another approach to the problem is to strictly separate code from data (and 
store all variables and the like separate from the code), then put the code 
into ROM or similar.

Randy Kramer
-- 
"I didn't have time to write a short letter, so I created a video 
instead."--with apologies to Cicero, et.al.