Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

so the logic is still clear, albiet obsured sometimes, just the variable names are crazy.

If I paste in geany or IDEA, the bleeding outside of the line is removed, though the characters are still weird. If I run it through google closure compiler, I get (advanced_optimizations) :-

function(c){return c.d=[{name:"+",a:function(a,b){return a+b}},{name:"-",a:function(a,b){return a-b}},{name:"",a:function(a,b){return ab}},{name:"/",a:function(a,b){return a/b}}],c.c=c.d[0],c.b=function(a,b,d){return a=parseFloat(a||0),b=parseFloat(b||0),c.result=d.a(a,b)},c.e("[left, right, operator]",function(){return c.b(c.left,c.right,c.c)})};



Was about to say the same. Uglify would clean it up as well.


For small programs you will be able to remove the ZALGO-like text. Since it replaces the actual variable names with an obfuscated name, you wont ever be able to get the original code back (i.e. 'var foo' will become 'var he_comes123'. With a lot more code will make the reverse-engineering not worth the time spent recreating the original. See the look_of_disapproval option of gulp-obfuscate for another example: function ಠ_ಠ4() { var ಠ_ಠ1, ಠ_ಠ2, ಠ_ಠ3; ... ಠ_ಠ3 = ಠ_ಠ1 + ಠ_ಠ2; return ಠ_ಠ3; }




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: