Jump to content

Talk:Obfuscation

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by ThePenultimateOne (talk | contribs) at 02:09, 24 April 2016 (White-box Cryptography redirect loop: new section). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

WikiProject iconMedia Unassessed
WikiProject iconThis article is within the scope of WikiProject Media, a collaborative effort to improve the coverage of Media on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
???This article has not yet received a rating on Wikipedia's content assessment scale.
???This article has not yet received a rating on the project's importance scale.
WikiProject Media To-do List:

WikiProject iconSociology Unassessed
WikiProject iconThis article is within the scope of WikiProject Sociology, a collaborative effort to improve the coverage of sociology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
???This article has not yet received a rating on Wikipedia's content assessment scale.
???This article has not yet received a rating on the project's importance scale.

Intent

Is Obfuscation always done intentionally ?

Yes

My understanding is that whenever obfuscation is referring to an unintentional behavior, it comes with a pejorative connotation. --Joannes Vermorel (talk) 19:06, 11 July 2011 (UTC)[reply]

Neutral POV

It is vital that such a project keeps a neutral point of view in its content. I literally spit out my tea laughing whist reading "(also see Internal Revenue Code)", but such humorous jabs will be deleted from this article. Xoxxixxox (talk) 23:08, 19 April 2011 (UTC)[reply]

Usage in enterprise software?

At Lokad.com (disclaimer: I am working for this company), we are routinely using obfuscation for big enterprise clients. The process is detailed at http://www.lokad.com/obfuscation.ashx . In short, obfuscation removes most of the need for our clients to actually trust Lokad as a 3rd party forecasting component. Such a usage might be worth of inclusion within the article. --Joannes Vermorel (talk) 19:03, 11 July 2011 (UTC)[reply]

Reference Issue

  1. 4 relating to Mark Twain's, Fenimore Cooper's Literary Offenses, goes nowhere but to a dead line. — Preceding unsigned comment added by Deepsean666 (talkcontribs) 19:47, 9 November 2014 (UTC)[reply]


It could go here instead: http://www.gutenberg.org/ebooks/3172 — Preceding unsigned comment added by Deepsean666 (talkcontribs) 19:50, 9 November 2014 (UTC)[reply]

White-box Cryptography redirect loop

Hi

White-box cryptography redirects to this page, and this page also has a link to white-box cryptography. This creates a potentially confusing redirect loop. Can we please fix this?