They USE Type-1 encryption hardware and Tempest approved hardware.
Quote from trend2009:
Jerry,
Since you are veteran programmer, possibly you have idea how to load an encrypted code into memory and decrypted it there and execute without writing temporary file on hard disk first. Is that possible and how difficult to do it?
I guess this could be one of the best ways to protect the code. As one of the poster mentioned previously, you can use the first application to load the second application and encrypt the second one and run it in memory. the password for the decryption could be dynamic sent to the first application each morning.
Quote from WinstonTJ:
the latency involved in these security measures would kill the trade. In the real world of auto-systems you have to give your guys full access and incentivize everyone involved to want nothing but the most profitable system. What is best for the group is best for the individual.
By the time you create false signals out of one box and then have another process them, etc. and have it all encrypted, etc. you wonât be competitive with other guys who straight up run the same trade. Anyone who has the ability to change the code/logic in the system needs to be granted full access to the source code and IMO there is no way around that. You would spend more time trying to protect the work they wrote â from them and trust would be non-existent, etc. The reality is most ATS systems work well only in the market conditions they were written and most also have a short lifespan. The goal is to get them up & trading ASAP and then work on building out the next trade â not trying to secure/protect anything existing.
Quote from Jerry030:
The Real Story of Trading Software Espionage[/url]
Quote from WinstonTJ:
that story is total BS and GS/media hype. The guy brought work home and used a proxy server to email stuff to himself. If you know anything about the code/algos in question you'd know that it's not worth thr programmer's time to try and steal this - they can just re-write it. yeah it's labor intensive but easier than risking jail time, etc.
GS just needed an excuse to lock this guy's IP down so that's what they did.
Quote from Jerry030:
You seem to be a real expert here. When ther is a news story that shows there may be a few holes in the"gotta trust your programmer" theory, you know all about details not reported in the media.
Are you a reporter? ...with GS security department? ....perhaps in local law enforcement? ..... a globally known security consultant?
I'm really curious what you do when not posting on ET. Tell us, please. [/QUOT
sent you a PM