Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

But the VM detection has to occur BEFORE you setup the clever encrypted CPU stuff so that code is then vulnerable to the usual debugger cracking techniques (without worrying about the encryption stuff).


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: