Talk:Obfuscation

From Wikipedia, the free encyclopedia
Jump to: navigation, search
WikiProject Media (Rated Start-class, Mid-importance)
WikiProject icon This article is within the scope of WikiProject Media, a collaborative effort to improve the coverage of Media on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 Mid  This article has been rated as Mid-importance on the project's importance scale.
 
WikiProject Sociology (Rated Start-class, Mid-importance)
WikiProject icon This article is within the scope of WikiProject Sociology, a collaborative effort to improve the coverage of sociology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 Mid  This article has been rated as Mid-importance on the project's importance scale.
 
WikiProject Computing (Rated Start-class, Mid-importance)
WikiProject icon This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 Mid  This article has been rated as Mid-importance on the project's importance scale.
 

Intent[edit]

Is Obfuscation always done intentionally ?

Yes[edit]

My understanding is that whenever obfuscation is referring to an unintentional behavior, it comes with a pejorative connotation. --Joannes Vermorel (talk) 19:06, 11 July 2011 (UTC)

Neutral POV[edit]

It is vital that such a project keeps a neutral point of view in its content. I literally spit out my tea laughing whist reading "(also see Internal Revenue Code)", but such humorous jabs will be deleted from this article. Xoxxixxox (talk) 23:08, 19 April 2011 (UTC)

Usage in enterprise software?[edit]

At Lokad.com (disclaimer: I am working for this company), we are routinely using obfuscation for big enterprise clients. The process is detailed at http://www.lokad.com/obfuscation.ashx . In short, obfuscation removes most of the need for our clients to actually trust Lokad as a 3rd party forecasting component. Such a usage might be worth of inclusion within the article. --Joannes Vermorel (talk) 19:03, 11 July 2011 (UTC)

Reference Issue[edit]

  1. 4 relating to Mark Twain's, Fenimore Cooper's Literary Offenses, goes nowhere but to a dead line. — Preceding unsigned comment added by Deepsean666 (talkcontribs) 19:47, 9 November 2014 (UTC)


It could go here instead: http://www.gutenberg.org/ebooks/3172 — Preceding unsigned comment added by Deepsean666 (talkcontribs) 19:50, 9 November 2014 (UTC)

White-box Cryptography redirect loop[edit]

Hi

White-box cryptography redirects to this page, and this page also has a link to white-box cryptography. This creates a potentially confusing redirect loop. Can we please fix this? — Preceding unsigned comment added by ThePenultimateOne (talkcontribs) 02:09, 24 April 2016 (UTC)