Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

The Archive Base

The Archive Base Logo The Archive Base Logo

The Archive Base Navigation

  • Home
  • SEARCH
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Add group
  • Groups page
  • Feed
  • User Profile
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Buy Points
  • Users
  • Help
  • Buy Theme
  • SEARCH
Home/ Questions/Q 347039
In Process

The Archive Base Latest Questions

Editorial Team
  • 0
Editorial Team
Asked: May 12, 20262026-05-12T11:14:00+00:00 2026-05-12T11:14:00+00:00

I’m building a centralized desktop application using Python/wxPython. One of the requirements is User

  • 0

I’m building a centralized desktop application using Python/wxPython. One of the requirements is User authentication, which I’m trying to implement using LDAP (although this is not mandatory).

Users of the system will be mechanical and electrical engineers making budgets, and the biggest problem would be industrial espionage. Its a common problem that leaks occur commonly from the bottom on informal ways, and this could pose problems. The system is set up in such a way that every user has access to all and only the information it needs, so that no one person but the people on top has monetary information on the whole project.

The problem is that, for every way I can think to implement the authentication system, Python’s openness makes me think of at least one way of bypassing/getting sensible information from the system, because “compiling” with py2exe is the closest I can get to obfuscation of the code on Windows.

I’m not really trying to hide the code, but rather make the authentication routine secure by itself, make it in such a way that access to the code doesn’t mean capability to access the application. One thing I wanted to add, was some sort of code signing to the access routine, so the user can be sure that he is not running a modified client app.

One of the ways I’ve thought to avoid this is making a C module for the authentication, but I would rather not have to do that.

Of course this question is changing now and is not just “Could anyone point me in the right direction as to how to build a secure authentication system running on Python? Does something like this already exist?”, but “How do you harden an scripting (Python) against wrongful modification?”

  • 1 1 Answer
  • 0 Views
  • 0 Followers
  • 0
Share
  • Facebook
  • Report

Leave an answer
Cancel reply

You must login to add an answer.

Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. Editorial Team
    Editorial Team
    2026-05-12T11:14:00+00:00Added an answer on May 12, 2026 at 11:14 am

    How malicious are your users? Really.

    Exactly how malicious?

    If your users are evil sociopaths and can’t be trusted with a desktop solution, then don’t build a desktop solution. Build a web site.

    If your users are ordinary users, they’ll screw the environment up by installing viruses, malware and keyloggers from porn sites before they try to (a) learn Python (b) learn how your security works and (c) make a sincere effort at breaking it.

    If you actually have desktop security issues (i.e., public safety, military, etc.) then rethink using the desktop.

    Otherwise, relax, do the right thing, and don’t worry about “scripting”.

    C++ programs are easier to hack because people are lazy and permit SQL injection.

    • 0
    • Reply
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Ask A Question

Stats

  • Questions 202k
  • Answers 202k
  • Best Answers 0
  • User 1
  • Popular
  • Answers
  • Editorial Team

    How to approach applying for a job at a company ...

    • 7 Answers
  • Editorial Team

    What is a programmer’s life like?

    • 5 Answers
  • Editorial Team

    How to handle personal stress caused by utterly incompetent and ...

    • 5 Answers
  • Editorial Team
    Editorial Team added an answer I don't know if blueprint provides this function. But it… May 12, 2026 at 8:24 pm
  • Editorial Team
    Editorial Team added an answer Try this: for file in `ssh myname@example.com 'ls -d dir/*/'`… May 12, 2026 at 8:24 pm
  • Editorial Team
    Editorial Team added an answer I'm not sure if this is your issue or not,… May 12, 2026 at 8:24 pm

Related Questions

I'm trying to decode HTML entries from here NYTimes.com and I cannot figure out
I ran into a problem. Wrote the following code snippet: teksti = teksti.Trim() teksti
In order to apply a triggered animation to all ToolTip s in my app,
I have a French site that I want to parse, but am running into
I have text I am displaying in SIlverlight that is coming from a CMS

Trending Tags

analytics british company computer developers django employee employer english facebook french google interview javascript language life php programmer programs salary

Top Members

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help
  • SEARCH

Footer

© 2021 The Archive Base. All Rights Reserved
With Love by The Archive Base

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.