Click here to Skip to main content
15,903,362 members

Comments by Member 13531459 (Top 1 by date)

Member 13531459 20-Nov-17 12:46pm View    
My application doesn't store any memory whatsoever between executions. And the decryption and encryption is completely dependent on the keys which dissappear after execution. Would this help deter reverse engineering at all?