spurlock | 8 years ago | on: Ask HN: Can you protect your JavaScript code?
spurlock's comments
spurlock | 8 years ago | on: Ask HN: What business service would you pay $100/mo for
spurlock | 8 years ago | on: I ask 100 information questions to four digital assistants
spurlock | 8 years ago | on: I ask 100 information questions to four digital assistants
This is changing. If Google had their way, they would be assigning IPV6 addresses to bits of dust lying around in your house and trying to assign semantic meaning to them. If they had their way.
spurlock | 8 years ago | on: Ask HN: Best tech Twitter accounts to follow
spurlock | 8 years ago | on: Ask HN: Front end designers, where did you start?
So to answer your question - I started by calmly accepting that as a developer, I would be typing out a lot of the same bits of code over and over, often creating <table> soup in the early days, and have since moved onto <div> soup and then styling accordingly with CSS. Sadly there is this trend of designing sites in reverse and people doing all the CSS and JavaScript first, and only when they're ready they start adding actual content.
spurlock | 8 years ago | on: Online AES Key/IV generator
spurlock | 8 years ago | on: Brazilian site teaches journalists how to protect sources and personal data
spurlock | 8 years ago | on: Photobucket limits displaying of images on external sites to $40/month plan
spurlock | 8 years ago | on: Brazilian site teaches journalists how to protect sources and personal data
spurlock | 8 years ago | on: Ransomware attack 'not designed to make money', researchers claim
[1]: https://posteo.de/en/blog/info-on-the-petrwrappetya-ransomwa...
spurlock | 8 years ago | on: Email account used by Petya ransomeware has just been closed
There are countless obfuscation tools out there, but in the end if someone wants your code, they can reverse it into more readable code and steal it, using it on their website/webapp. It's the way browser engines are designed that ensures this. JavaScript is there for the taking and is not compiled into machine code. It's interpreted. So no, you can't protect it. No matter how much you abuse the eval() function or mangle the code[1]
[1]: https://en.wikipedia.org/wiki/JSFuck