Is using digital signatures and bytecode machines a viable technique to make reverse engineering hard? [duplicate]
This question already has answers here: How can software be protected from piracy? (17 answers) Closed 9 years ago. If I have a private key with which I sign byte code, and a public key with which I can decipher the signed code to verify its authenticity, can I protect that byte code from being […]