1waffle1
|
  |
| Joined: 16 Oct 2007 |
| Total Posts: 16381 |
|
|
| 28 Apr 2013 07:46 PM |
MÀÏÆÙÞÝ8ßÌËä=ÊÝ@éÚíÕºÕ2»¾½Ô½ÔÃ:ÅÌå>åÒAÐßÁÔÙØ3Ü·ÆŸ8UàÍ<ïÀí@åÄÛÙ¶ÃÚ×¶Õ6ߺÉâ;ä¿Îí@éìá/ºÕÜÁÆÁ6Õà9ÄÓÀ¿>ÉÄAêáË0ÉÊÅâ5àÕê9â½Ìå>çÜËÊÕ»Ìϸ3η6‰8á¼Ëä=ðÁîAæÅÇÚ·ÄÛØ·Ö7º9ÊÁæã>ÛÒAÊͷην4ÛÈ7ÆÕÌßäã>åÒѪ
This string is encoded in such a particular way that I am confident that you will not be able to figure out what that particular way is. That string is the encoded result of this string.
If I were to encode my scripts this way and then decode them with another script to run them in an SB, would that at all be an effective method of protecting it? The memory location can easily be located and then easily copied, and then someone could simply copy the script to decode it, but how easy would that be to do? |
|
|
| Report Abuse |
|
|
|
| 28 Apr 2013 07:48 PM |
| No because people can take the decoder. |
|
|
| Report Abuse |
|
|
|
| 28 Apr 2013 07:50 PM |
| It wouldn't be so much harder to decode, really: Remember, we'd have access to the decoder script, too, so post that and see how secure it is then. |
|
|
| Report Abuse |
|
|
booing
|
  |
| Joined: 04 May 2009 |
| Total Posts: 6594 |
|
|
| 28 Apr 2013 07:53 PM |
| Why don't you try yourself? Open CE, select process, select String under Value Type and hit search... |
|
|
| Report Abuse |
|
|
1waffle1
|
  |
| Joined: 16 Oct 2007 |
| Total Posts: 16381 |
|
|
| 28 Apr 2013 07:54 PM |
| What if I encoded the script to decode it with a different method, and then used that method to decode the script that decodes what I want to decode? Then you wouldn't know what to decode. You would only have the second decoder, which would only decode the first decoder, and not the main script. If you knew to look for the first decoder and then decoded it, then you could decode the first script, but that sounds like a complicated process that simple or even desperate people wouldn't figure out. |
|
|
| Report Abuse |
|
|
cntkillme
|
  |
| Joined: 07 Apr 2008 |
| Total Posts: 44956 |
|
|
| 28 Apr 2013 07:55 PM |
Looks like ascii encryption, I'ma try to decode ;)
[Loop 32767 times until there is something that makes sense] too lazy. |
|
|
| Report Abuse |
|
|
1waffle1
|
  |
| Joined: 16 Oct 2007 |
| Total Posts: 16381 |
|
|
| 28 Apr 2013 07:56 PM |
First method
NÁÐÇÚßÞ9¼;âÏ>åÒѪ This is a string.
Second method
žØàÜæéé—Ù™íäœðççÔ This is a string. |
|
|
| Report Abuse |
|
|
booing
|
  |
| Joined: 04 May 2009 |
| Total Posts: 6594 |
|
|
| 28 Apr 2013 07:56 PM |
| Sometimes, you're a bit overconfident, but to be honest, you should try to exploit and raise your context so you can loadfile. |
|
|
| Report Abuse |
|
|
lombardo2
|
  |
| Joined: 30 Nov 2008 |
| Total Posts: 1604 |
|
|
| 28 Apr 2013 07:56 PM |
| ASCII a encoding, it tells the way bits are represented in characters. Plus it's utf-8 |
|
|
| Report Abuse |
|
|
coplox
|
  |
| Joined: 07 Jun 2008 |
| Total Posts: 3252 |
|
|
| 28 Apr 2013 08:03 PM |
½ùûî▀ûî▀₧▀îïìûæÿ╤
This is a string. |
|
|
| Report Abuse |
|
|
1waffle1
|
  |
| Joined: 16 Oct 2007 |
| Total Posts: 16381 |
|
|
| 28 Apr 2013 08:04 PM |
@lom
"This is a string."
\84\104\105\115\32\105\115\32\97\32\115\116\114\105\110\103\46
"NÁÐÇÚßÞ9¼;âÏ>åÒѪ"
\78\193\208\199\218\223\222\57\188\59\226\207\62\229\210\209\170
I see no obvious correlation. Subtract them: 6 -89 -103 -84 -186 -118 -107 -25 -91 -27 -111 -91 52 -124 -100 -106 -124
|
|
|
| Report Abuse |
|
|
lombardo2
|
  |
| Joined: 30 Nov 2008 |
| Total Posts: 1604 |
|
|
| 28 Apr 2013 08:05 PM |
| ^That's a simple rotation cypher, right? |
|
|
| Report Abuse |
|
|
lombardo2
|
  |
| Joined: 30 Nov 2008 |
| Total Posts: 1604 |
|
|
| 28 Apr 2013 08:06 PM |
^The arrow was meant to point to coplox.
@Waffle: That was to cntkillme c: |
|
|
| Report Abuse |
|
|
cntkillme
|
  |
| Joined: 07 Apr 2008 |
| Total Posts: 44956 |
|
| |
|
coplox
|
  |
| Joined: 07 Jun 2008 |
| Total Posts: 3252 |
|
| |
|
1waffle1
|
  |
| Joined: 16 Oct 2007 |
| Total Posts: 16381 |
|
|
| 28 Apr 2013 08:08 PM |
| I'm just doing math to the byte numbers and then undoing the math. I wanted to use more modulus, but modulus is hard to undo. |
|
|
| Report Abuse |
|
|
lombardo2
|
  |
| Joined: 30 Nov 2008 |
| Total Posts: 1604 |
|
|
| 28 Apr 2013 08:09 PM |
| @coplox: But that is an monoalphabetic cypher, same character hava same results. You could brake that with frequency analysis given a long enough string. D: |
|
|
| Report Abuse |
|
|
Parthax
|
  |
| Joined: 27 Apr 2011 |
| Total Posts: 6941 |
|
|
| 28 Apr 2013 08:09 PM |
Encode an encoded version of the decoded encoder's decoder. wait wut |
|
|
| Report Abuse |
|
|
1waffle1
|
  |
| Joined: 16 Oct 2007 |
| Total Posts: 16381 |
|
|
| 28 Apr 2013 08:13 PM |
| Was that actually advice, or was that just you attempting to say something because you thought you might be able to? |
|
|
| Report Abuse |
|
|
Parthax
|
  |
| Joined: 27 Apr 2011 |
| Total Posts: 6941 |
|
| |
|
Parthax
|
  |
| Joined: 27 Apr 2011 |
| Total Posts: 6941 |
|
|
| 28 Apr 2013 08:14 PM |
That was advice, to be honest. I confused myself a bit typing that, but I think I explained it right. |
|
|
| Report Abuse |
|
|
Quenty
|
  |
| Joined: 03 Sep 2009 |
| Total Posts: 9316 |
|
|
| 28 Apr 2013 08:15 PM |
If it's a good encryption system, then releasing the code that decodes it should be no issue. Releasing the key would be, but the actual encryption method should not be.
Basically, some sort of secure hashing system already used by banks and stuff should suffice - the main issue is, of course, getting the key over without anyone else seeing it. |
|
|
| Report Abuse |
|
|
Parthax
|
  |
| Joined: 27 Apr 2011 |
| Total Posts: 6941 |
|
|
| 28 Apr 2013 08:15 PM |
| And my other post was a cipher which may help you protect strings, etc, if you know the right word to it. Classic cipher. |
|
|
| Report Abuse |
|
|
1waffle1
|
  |
| Joined: 16 Oct 2007 |
| Total Posts: 16381 |
|
|
| 28 Apr 2013 08:16 PM |
@lom
this is ('A'):rep(3e2) encoded:
first way
€‚ƒ„…qrstuvwxyz{|}~€‚ƒ„…qrstuvwxyz{|}~€‚ƒ„…qrstuvwxyz{|}~€‚ƒ„…qrstuvwxyz{|}~€‚ƒ„…qrstuvwxyz{|}~€‚ƒ„…qrstuvwxyz{|}~€‚ƒ„…qrstuvwxyz{|}~€‚ƒ„…qrstuvwxyz{|}~€‚ƒ„…qrstuvwxyz{|}~€‚ƒ„…qrstuvwxyz{|}~€‚ƒ„…qrstuvwxyz{|}~€‚ƒ„…qrstuvwxyz{|}~€‚ƒ„…qrstuvwxyz{|}~€‚ƒ„…qrstuvwxyz{|}~€‚ƒ„
|
|
|
| Report Abuse |
|
|
1waffle1
|
  |
| Joined: 16 Oct 2007 |
| Total Posts: 16381 |
|
|
| 28 Apr 2013 08:19 PM |
| @Quenty I can implement a key into it, but that really is the problem. There is no possible way to do something without someone else being able to see it. If you can see it, then anyone else can. It's all the same access level. |
|
|
| Report Abuse |
|
|