Yes, a malicious customer could read out obfuscated code in flash memory - but it is compressed, and fragmented over the memory space.
It's a hugely difficult task to do anything with. I would find it very hard, and I wrote it. Maybe try it yourself and see what you can do? Personally I'd say it's more difficult than reading the ARM Thumb assembly code created by normal C compilers.
Honestly, if you're worried that somebody may be willing to totally recreate your software and hardware from scratch and fake it, then you'll need to hire a specialist to design the software for you - not try and make it yourself.
Sure, you could use compiled C code and turn on the 'flash protection' bit, but I can pretty much guarantee that won't stop a skilled group of people with infinite time and resources from faking it.
Espruino is a JavaScript interpreter for low-power Microcontrollers. This site is both a support community for Espruino and a place to share what you are working on.
Yes, a malicious customer could read out obfuscated code in flash memory - but it is compressed, and fragmented over the memory space.
It's a hugely difficult task to do anything with. I would find it very hard, and I wrote it. Maybe try it yourself and see what you can do? Personally I'd say it's more difficult than reading the ARM Thumb assembly code created by normal C compilers.
Honestly, if you're worried that somebody may be willing to totally recreate your software and hardware from scratch and fake it, then you'll need to hire a specialist to design the software for you - not try and make it yourself.
Sure, you could use compiled C code and turn on the 'flash protection' bit, but I can pretty much guarantee that won't stop a skilled group of people with infinite time and resources from faking it.