obfuscation,hhvm,code-security
@paulbliss: You could compile a bytecode repository and run that, but it's not something that would be difficult to reverse engineer. ... There isn't any great documentation on building repos. The wrapper script in tools/hhvm_wrapper.php has some useful shortcuts, you can look at the help options. There really isn't a...
.net,security,design-patterns,design,code-security
While others already suggested how to restrict code making calls to your method, they do not create a security boundary and can be spoofed (unless you sign both assemblies and verify the evidence). Having a method in your business logic called DeleteAllData sounds pretty scary to me. If this method...