Researchers from UCLA have published a new technique for program obfuscation. The security of their method can be mathematically reduced to plausible assumptions about what can feasibly be computed in a reasonable amount of time. This new technique potentially eliminates a class of worrisome attack vectors. 


Comment