Quote from trend2009:
If you colocate the server with your broker, for sure he can have your executable code that generates trading signals. the question is if he can reverse engineer your executable.
Here is an example of a trival reverse code engineering project:
Decompilation in Practice: Reversing helpctr.exe
The following example illustrates a reverse engineering session against helpctr.exe, a Microsoft program provided with the Windows XP OS. The program happens to have a security vulnerability known as a buffer overflow. This particular vulnerability was made public quite some time ago, so revealing it here does not pose a real security threat. What is important for our purposes is describing the process of revealing the fault through reverse engineering. We use IDA-Pro to disassemble the target software. The target program produces a special debug file called a Dr. Watson log. We use only IDA and the information in the debug log to locate the exact coding error that caused the problem. Note that no source code is publicly available for the target software. Figure 3-4 shows IDA in action.
http://www.informit.com/articles/article.aspx?p=353553&seqNum=8