Benefit of asymmetric encryption vs trivial alternatives in compromised software?

Background information:
I have a client application that communicates with a server through a web API.
The data being communicated is not personally sensitive (no passwords, credit card details, usernames, etc). It’s just challenge/respons… Continue reading Benefit of asymmetric encryption vs trivial alternatives in compromised software?

C++ binary obfuscation: how to get around license checks being a simple if/then branches?

I’m looking into binary obfuscation for an exectuable binary written in C++. I realize preventing cracks is impossible, but making it slightly harder would be nice.

No matter how complex the actual license scheme is, I can’t think of a wa… Continue reading C++ binary obfuscation: how to get around license checks being a simple if/then branches?