Engineering
How to make your software tamperproof
Watermarking and tamperproofing are also related. In fact, if perfect tamperproofing were available, watermarking would be easy: Just watermark with any trivial algorithm, tamperproof, and by definition the attacker will not be able to destroy the mark! It’s precisely because we don’t have perfect tamperproofing that we need to worry about watermarking stealth: We have to assume that an attacker who can find a watermark will also be able to modify the program to destroy the mark.
wow, fantastic, superb, fabulous,mischievous, flabbergast, ugly NEWS: What joke? Nuclear Bomb Researchers Accidentally Blow Up Building – Science – Gawker
wow, fantastic, superb, fabulous,mischievous, flabbergast, ugly NEWS hahahaha what a joke ?
“On December 16, 2009, Shock and Detonation Physics Group researchers heard a loud unusual noise from Technical Area 15, Building 562 after firing a shot from a large-bore powder gun (LBPG)…. the researchers conducted surveillance outside TA-15-562 and observed that two doors had been blown off the facility and concrete shielding blocks on the west and east side of the building were separated from the wall.