Skip to content

MAKE YOUR CODE HACKER PROOF!

  •   Home
    •   Home
    •   Why use tamper-proofing ?
  • Technology
    •   White Hawk Technology
    •   What is software tamper-proofing?
    •   Frequently Asked Questions
  • White Hawk Solutions
    •   Critical Infrastructure & SCADA
    •   Military & Air Force
    •   Medical Devices
    •   Connected Car
    •   License Checking
    •   Data & Encryption Protection
  • Products
    •   Products
    • Transmogrifier: GPU protection
    •   NEST-X86 BETA Release
    •   NEST-X86 Tutorial
  • Company
    •   Company
    •   Management Team
    •   Resources
    •   Joining us?
    •   Contacts
    •   About this web site
  • Blog
    •   Blog

Tag: Backdoor

Encryption seems to be the new bone of contention

This entry has been moved to Chris’ personal blog

.

Author whadminPosted on December 14, 2015June 30, 2016Categories Critique and Opinions, Encryption, Nation stateTags Backdoor, Encryption, FBI, white box

We have a free, time-limited beta release available.

Protecting a test program. [Youtube 3.30 min]

Pages

  • Code Protection and Application Security
    • Why use tamper – proofing ?
  • White Hawk Technology
    • What is software tamper-proofing?
  • White Hawk Solutions
    • Automotive Sector and Connected Car
    • Critical Infrastructure & SCADA
    • Data & Encryption Protection
    • License Checking
    • Medical Devices
    • Military & Air Force
  • Company
    • Resources
    • Management Team
    • Want to join us?
    • Contacts
  • Products
    • Transmogrifier
    • NEST-X86 BETA Release
    • NEST-X86 Tutorial
  • Frequently Asked Questions
  • Blog
  • About this web site

Recent Blog Posts

  • Ransomware, should you pay or not?
  • Encryption seems to be the new bone of contention
  • What if…
  • Decoys, take 2
  • Troubles with Debuggers

Blog Categories

  • Advice for Individuals (2)
  • Critique and Opinions (5)
  • Cyber Incidents (10)
    • Cyber crime (5)
    • International Security (4)
    • Nation state (4)
  • Industry examples (6)
    • Aviation Industry (2)
    • Computers and Computer Security (2)
  • Technical (7)
    • Anti-debug (1)
    • Decoys (2)
    • Encryption (2)
  • Uncategorized (1)
  •   Home
    •   Home
    •   Why use tamper-proofing ?
  • Technology
    •   White Hawk Technology
    •   What is software tamper-proofing?
    •   Frequently Asked Questions
  • White Hawk Solutions
    •   Critical Infrastructure & SCADA
    •   Military & Air Force
    •   Medical Devices
    •   Connected Car
    •   License Checking
    •   Data & Encryption Protection
  • Products
    •   Products
    • Transmogrifier: GPU protection
    •   NEST-X86 BETA Release
    •   NEST-X86 Tutorial
  • Company
    •   Company
    •   Management Team
    •   Resources
    •   Joining us?
    •   Contacts
    •   About this web site
  • Blog
    •   Blog
© White Hawk Software