Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

So your implying that it's not trivial. I acknowledge that.

What I was implying is that a third party deobfuscation project by reverse engineering with minimal input from the original developers would presumably be different in terms of variable/function names, etc, comparing it to the original source.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: