You are missing trading opportunities:
- Free trading apps
- Over 8,000 signals for copying
- Economic news for exploring financial markets
Registration
Log in
You agree to website policy and terms of use
If you do not have an account, please register
Gentlemen, I just wish I had this. I am not saying that it is easy to implement, but somehow it seems possible to me. Let them decompile and get the binary code (the main thing is that it is not the source code). If they find a specialist that understands why I use two-dimensional Fourier transform in Expert Advisor and have date operations in it and not a wavelet, flagship in their hands. If they can get them out of there competently and it will trade correctly
2. When you open a real account with any brokerage company, obtain a key (electronic or otherwise). You know they steal passwords. I don't want to have my login and password sent to the market up to their necks. I've seen somewhere that the demo password is simple (5-8 letters and digits), and the password to enter the real market is much more complicated.
1. This is the current situation. The program is compiled to bytecode, which is executed on the virtual machine and saved in ex4. This bytecode roughly corresponds to the machine code of the real machines. If an attacker gains access to bytecode, it is a matter of technique and skill to restore the algorithm. But it is important to understand that in principle this byte-code cannot be hidden from an intruder by leaving it open for a terminal.
2. The connection to the terminal is encrypted as it is now. For me, it would be better to use standard SSL, but there is hardly any self-written encryption. More likely, the only proprietary scheme is the shared secret between the DC and the terminal, and the encryption itself is AES or something like that.
I specifically looked it up, on the 2nd point it is possible and already implemented by the Finns, even the regulations state how to handle the electronic keys and what it leads to.
http://www.finam.ru/services/AccountWizard00002/default.asp
On the first point. We make the algorithm of ex4 formation open and fully transparent. We open a contest with a good money prize for its modification with the aim to protect it from decompilation and to get the source code. If as a result of the contest we get ideas for protection, we implement them and get a certificate of protection class from some well-known organization.
The question is whether the creators want this (whether it is profitable for them to make solid software and bite everyone in this market niche), or it is easier for them to hold a competition and ... get on with it, because they know the compilation algorithm.
amirul "... then the restoration of the algorithm - a matter of technology and level of training ..." time is the main thing, if the restoration of the original algorithm should spend 1 year (a specialist of the highest qualification) IHMO this is enough
I specifically looked it up, on the 2nd point it is possible and already implemented by the Finns, even the regulations state how to handle the electronic keys and what it leads to.
http://www.finam.ru/services/AccountWizard00002/default.asp
On the first point. We make the algorithm of ex4 formation open and fully transparent. We open a contest with a good money prize for its modification with the aim to protect it from decompilation and to get the source code. If as a result of the contest we will get ideas on protection, we will implement them and get a certificate on protection class in some famous organization.
The question is whether the software creators want this (whether it is profitable for them to make solid software and bite everyone in this niche of the market), or it is easier for them to hold a competition and ... get on with it, because they know the compilation algorithm.
amirul "... then the restoration of the algorithm - a matter of technology and level of training ..." time is the main thing, if the restoration of the original algorithm should spend 1 year (a specialist of the highest qualification) IHMO this is enough
As for protection before ex4. Once again, it is PRINCIPALLY impossible. The only thing that can make life difficult for a potential cracker is obscurity. And to ensure obscurity, open contests are not the best idea. And here we should remember that obscurity is a one-time resource. Once one (or preferably a group of) people hack, everyone else can enjoy the results of their work without bothering to hack
Maybe there was such a wish already :)
That mql4 files - open (work) in MT5 as well, i.e. that they don't all have to be rewritten :)
I see that you have a lot of knowledge in this field. Please give your estimation of the time needed for MQL-developer who knows exactly how an executable file ex4 is generated. Having this ex4 file in hand to restore the source code of mq4, the interest is purely theoretical, how much time is needed for this. sec, min, hour, day ?
amirul
I see that you have a lot of knowledge in this field. Please give your estimation of the time needed for MQL-developer who knows exactly how an executable file ex4 is generated. Having this ex4 file in hand to restore the source code of mq4, the interest is purely theoretical, how much time is needed for this. sec, min, hour, day ?
Two key system.
A wants to sell/transfer an advisor to B. B generates two keys on his machine: a private (secret) key and a public key. The private key is kept by B under 100 locks. B gives the shared key to A who uses this key to create an encrypted EX4 file and gives the file to B and only B uses his secret key to decrypt EX4 file. With a shared key, a secret key cannot be made. An intruder would have B's shared key, but could do nothing with it.
According to Philip R. Zimmermann's theory, PGP
Two key system.
A wants to sell/transfer an advisor to B. B generates two keys on his machine: a private (secret) key and a public key. The private key is kept by B under 100 locks. B gives the shared key to A who uses this key to create an encrypted EX4 file and gives the file to B and only B uses his secret key to decrypt EX4 file. With a shared key, it is not possible to make a secret key. An intruder will have B's shared key, but will not be able to do anything with it.
According to Philip R. Zimmermann's theory, PGP software.