If I show you a safe with a million dollars in it, then leave, you will end up in this safe. There is no technology that protects this money; your only real barrier is time.
The same goes for software. The only way to protect resources is not to place them where someone can, given enough time, get to them. The most efficient option that I know is storing critical resources on a server that you control.
Of course, many people are wrong. One way or another, they allow temporary copying of a protected resource to a user computer. At this point, the game is playing. This means that you can truly protect resources that have a temporary clone. For example, a security token that expires, or calculation results that do not show how the calculation was performed.
Jonathan allen
source share