"Joshua Muskovitz" <josh at open.com> writes: > But... I don't want prying eyes to easily reverse engineer our key > validation process, or it will become useless. If your key authentication system relies on people not being able to find out your algorithm, then you need a better authentication system, not a code obfuscator. -- Adam Sampson azz at gnu.org