It’s been in my mind if we are using the software/program or even hardware of a tech company, we can play around, install-unsinstall and more. Then how is it so difficult for someone to “unhide” the source code that the device uses? Technically the code is in the device somewhere hidden in it, so it’s there, but still, it’s almost impossible to obtain the source code. How do they achieve this so no one copies their code?
In: 366
>Technically the code is in the device somewhere hidden in it, so it’s there, but still, it’s almost impossible to obtain the source code.
The source code will not usually exist in the final product. Most software is compiled, meaning that new instructions are created using the source code as a guide. The compiled program “does what the source code looks like it does,” more or less, but it will generally be structured in a way much less friendly to humans (but friendlier to computers, which is the point of doing it in the first place)
Latest Answers