Goddamn. It's "algorithm", not "algorythim".
All this sounds more like anti-reverse engineering than anti-piracy. I don't need to know what "ñaouwrbuvuoawbavliybñiva" means to be able to copy it.
1. I'm confused. What? Are you proposing changing the font used to display the source code? This doesn't actually change the contents of a file, just how the file is displayed. The other person could easily choose not use the font you designed. Why would you distribute the source code in the first place?
How do "product keys" fit into this?
2. Distributing encrypted contents and the function used to decrypt them is the same as distributing the contents decrypted.
So to make it clearer the program creates a set of random algorythims, which are
used to umble up the data, this data is unique to this algorythim and cannot be duplicated |
Why can't the data be duplicated? For example:
"Uryyb, Jbeyq!"(decrypt with ROT13)
I can easily copy the encrypted data, like so:
"Uryyb, Jbeyq!"
I can even copy the algorithm along with the data:
"Uryyb, Jbeyq!"(decrypt with ROT13)
Now anyone can take my copy, apply the algorithm, and get back the original.
The algorythim is also jumbled up. |
This is problematic. How will you know the algorithm if it has encrypted itself? This is like locking a safe with the key inside it.