It’s been in my mind if we are using the software/program or even hardware of a tech company, we can play around, install-unsinstall and more. Then how is it so difficult for someone to “unhide” the source code that the device uses? Technically the code is in the device somewhere hidden in it, so it’s there, but still, it’s almost impossible to obtain the source code. How do they achieve this so no one copies their code?
In: 366
They call it the *source* code because it’s the *source* of the compiled artifact you actually run; compilation is an inherently lossy process so you can’t really go back (decompile) a compiled artifact into its source. You can decompile it into *something* but it’s not what the programmer actually wrote.
Latest Answers