Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. General Programming
  3. C#
  4. .NET and "industrial espionage"

.NET and "industrial espionage"

Scheduled Pinned Locked Moved C#
csharpcssasp-netdatabasebusiness
6 Posts 2 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • P Offline
    P Offline
    Palladino
    wrote on last edited by
    #1

    Hi friends, I am involved in project whose the development of base classes and architecture high level were under my team responsibility. After creating 80% of these classes I am about to involve more developers in the process and I fall in problem that is me leaving a little preoccupied: These basic components won't be maintained by production team and they will only have access to the binaries of these components. The tools that I made some tests for assemblies obfuscation it doesn't allow me to protect such assemblies inside the team. I would like that the team have these assemblies ALREADY protected, what would be the first level of safety against copy of intellectual property. My idea is that even if talented programmer gets to leave of company with the sources that contain the business rules, the CORE it (basic classes, personalized controls, access rules for database and etc) of the thing he won't have access, which, I belive, turns the sources "less attractive" because to create such components of the zero it would take plenty time. Does anybody already use some tool that allows something like that? Does anybody have some idea on this? Greetings, Marcelo Palladino Brazil

    M 1 Reply Last reply
    0
    • P Palladino

      Hi friends, I am involved in project whose the development of base classes and architecture high level were under my team responsibility. After creating 80% of these classes I am about to involve more developers in the process and I fall in problem that is me leaving a little preoccupied: These basic components won't be maintained by production team and they will only have access to the binaries of these components. The tools that I made some tests for assemblies obfuscation it doesn't allow me to protect such assemblies inside the team. I would like that the team have these assemblies ALREADY protected, what would be the first level of safety against copy of intellectual property. My idea is that even if talented programmer gets to leave of company with the sources that contain the business rules, the CORE it (basic classes, personalized controls, access rules for database and etc) of the thing he won't have access, which, I belive, turns the sources "less attractive" because to create such components of the zero it would take plenty time. Does anybody already use some tool that allows something like that? Does anybody have some idea on this? Greetings, Marcelo Palladino Brazil

      M Offline
      M Offline
      Marc Clifton
      wrote on last edited by
      #2

      Palladino wrote: I would like that the team have these assemblies ALREADY protected, what would be the first level of safety against copy of intellectual property. My idea is that even if talented programmer gets to leave of company with the sources that contain the business rules, the CORE it (basic classes, personalized controls, access rules for database and etc) of the thing he won't have access, which, I belive, turns the sources "less attractive" because to create such components of the zero it would take plenty time. 1. You need to trust your team. 2. You are making the assumption that someone will act unethically at best, and illegally at worst. Another company hiring such a person, at least here in the US, can get in real hot water. There are employee agreements to prevent this, including the jokingly unenforceable "you can't work in a related industry for 5 years after termination" type of BS. 3. Is this something you really feel is necesary to spend time and effort worrying about? Palladino wrote: Does anybody have some idea on this? It wasn't clear as to why you can't give the production team the obfuscated assemblies. How is obfuscation failing you in this instance? Marc Latest AAL Article My blog Join my forum!

      P 1 Reply Last reply
      0
      • M Marc Clifton

        Palladino wrote: I would like that the team have these assemblies ALREADY protected, what would be the first level of safety against copy of intellectual property. My idea is that even if talented programmer gets to leave of company with the sources that contain the business rules, the CORE it (basic classes, personalized controls, access rules for database and etc) of the thing he won't have access, which, I belive, turns the sources "less attractive" because to create such components of the zero it would take plenty time. 1. You need to trust your team. 2. You are making the assumption that someone will act unethically at best, and illegally at worst. Another company hiring such a person, at least here in the US, can get in real hot water. There are employee agreements to prevent this, including the jokingly unenforceable "you can't work in a related industry for 5 years after termination" type of BS. 3. Is this something you really feel is necesary to spend time and effort worrying about? Palladino wrote: Does anybody have some idea on this? It wasn't clear as to why you can't give the production team the obfuscated assemblies. How is obfuscation failing you in this instance? Marc Latest AAL Article My blog Join my forum!

        P Offline
        P Offline
        Palladino
        wrote on last edited by
        #3

        Hi Marc, Before anything: Thank you for trying to understand me. I am aware that my English is badly, I am trying to get better. Marc Clifton wrote: 3. Is this something you really feel is necesary to spend time and effort worrying about? hum... To read your post made to think me of another point of view. Perhaps it is not, really... I will continue thinking about this. Marc Clifton wrote: It wasn't clear as to why you can't give the production team the obfuscated assemblies. How is obfuscation failing you in this instance? I have like this a class (before obfuscation):public class MyClass { }
        After obfuscation:public class 983276376jssdjh { }
        Perhaps I am making something wrong, but this way, the assemblie becomes invalid for programming. The execution goes well, however. Hugs, Marcelo Palladino Brazil

        M 1 Reply Last reply
        0
        • P Palladino

          Hi Marc, Before anything: Thank you for trying to understand me. I am aware that my English is badly, I am trying to get better. Marc Clifton wrote: 3. Is this something you really feel is necesary to spend time and effort worrying about? hum... To read your post made to think me of another point of view. Perhaps it is not, really... I will continue thinking about this. Marc Clifton wrote: It wasn't clear as to why you can't give the production team the obfuscated assemblies. How is obfuscation failing you in this instance? I have like this a class (before obfuscation):public class MyClass { }
          After obfuscation:public class 983276376jssdjh { }
          Perhaps I am making something wrong, but this way, the assemblie becomes invalid for programming. The execution goes well, however. Hugs, Marcelo Palladino Brazil

          M Offline
          M Offline
          Marc Clifton
          wrote on last edited by
          #4

          Palladino wrote: Perhaps I am making something wrong, but this way, the assemblie becomes invalid for programming. The execution goes well, however. Ah, you so you want the source code obfuscated? It would be a little bit of work to add the automation, but what would happen if you took your obfuscated assembly, read it into Lutz Roeder's .NET Refelctor[^], and ran the "decompiler" function to emit the now obfuscated but still compileable assembly source? But I'm confused about something--why supply the source and obfuscate things like the class name? Wouldn't that break other functions that reference that class? Or do you *want* people to use the obfuscated source? No wait--you want to supply the internal source obfuscated, but there are certain "public" unobfuscated classes and methods that are the interface points? Is that it? Marc Latest AAL Article My blog Join my forum!

          P 2 Replies Last reply
          0
          • M Marc Clifton

            Palladino wrote: Perhaps I am making something wrong, but this way, the assemblie becomes invalid for programming. The execution goes well, however. Ah, you so you want the source code obfuscated? It would be a little bit of work to add the automation, but what would happen if you took your obfuscated assembly, read it into Lutz Roeder's .NET Refelctor[^], and ran the "decompiler" function to emit the now obfuscated but still compileable assembly source? But I'm confused about something--why supply the source and obfuscate things like the class name? Wouldn't that break other functions that reference that class? Or do you *want* people to use the obfuscated source? No wait--you want to supply the internal source obfuscated, but there are certain "public" unobfuscated classes and methods that are the interface points? Is that it? Marc Latest AAL Article My blog Join my forum!

            P Offline
            P Offline
            Palladino
            wrote on last edited by
            #5

            Hi again Marc, Marc Clifton wrote: No wait--you want to supply the internal source obfuscated, but there are certain "public" unobfuscated classes and methods that are the interface points? Is that it? It is exactly this! What is happening, with the tool that I am using: It is changing the names of the types, instead of changing implementation only. However, when beginning to talk with you I went to test other tools (Salamander, for instance) and I noticed that work in the expected way. It seems that am in the road. Thank you, again! Marcelo Palladino Brazil

            1 Reply Last reply
            0
            • M Marc Clifton

              Palladino wrote: Perhaps I am making something wrong, but this way, the assemblie becomes invalid for programming. The execution goes well, however. Ah, you so you want the source code obfuscated? It would be a little bit of work to add the automation, but what would happen if you took your obfuscated assembly, read it into Lutz Roeder's .NET Refelctor[^], and ran the "decompiler" function to emit the now obfuscated but still compileable assembly source? But I'm confused about something--why supply the source and obfuscate things like the class name? Wouldn't that break other functions that reference that class? Or do you *want* people to use the obfuscated source? No wait--you want to supply the internal source obfuscated, but there are certain "public" unobfuscated classes and methods that are the interface points? Is that it? Marc Latest AAL Article My blog Join my forum!

              P Offline
              P Offline
              Palladino
              wrote on last edited by
              #6

              Hi again, Marc! Now I have the clearest subject in my mind. I want assemblies obsfucation but it would like the names of the members not to be altered by this process. That is possible? Sincerely, Marcelo Palladino Brazil

              1 Reply Last reply
              0
              Reply
              • Reply as topic
              Log in to reply
              • Oldest to Newest
              • Newest to Oldest
              • Most Votes


              • Login

              • Don't have an account? Register

              • Login or register to search.
              • First post
                Last post
              0
              • Categories
              • Recent
              • Tags
              • Popular
              • World
              • Users
              • Groups