Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Obfuscation and compression are two potential extra hoops to jump through. It's easier to let the executable run for a bit and start from there.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: