The objective is to reduce detectability to reverse engineering or static Examination process by obscuring it and compromising readability. Obfuscating malware, As an example, will allow it to evade IDSes. – Jon Hanna Commented Jan 26, 2013 at 21:forty 1 @FumbleFingers I'd use neither chipper nor drownded in official composing https://torreyv628vww5.eedblog.com/profile