you stated this
Huh, would you look at that. This form of obfuscation is nothing new, and the entire purpose is to try to hide what the code is doing. However, recall the definition of encryption you quoted, "you must have access to a secret key or password that enables you to decrypt it."- If that was "encrypted", How did I "decrypt" it without a secret key?
The definition isn't known as obfuscation, it's known as polymorphism, the website Vx-heaven.org that i gave to you in the comment as a link will give you thousands of examples of what i was doing. You cant decrpyt it because it decrypts itself. Polymorphism is use to mutate a code through encryption, then decrypt the code all at once. it's better known as mutation or poly mutation. In it's own deffinition of polymorphic code, it plainly states that it is an encryption. not to mention the thousands of examples from sources from Vx-heaven.org that i gave you. All i said was simply that the definition says it's encryption. because the programming langage's code is encoded in a pattern of mutation, then that mutation is reversed in it's change, causing what ever that was encoded to be then decoded, you thought it wasn't encoded because in polymorphism everything that is encoded is automatically decoded, it's result is causing the appearance of randomization in the commands to lead confusion to the user, which is obfuscation. obfuscation is not the code being encoded and decoded, like my example of polymorphic encription. but the result in the appearance of the codes mutation affects at after the code is polymorphous, is called obfuscation. this is what you had trouble in understanding from my years of studying polymorphic engines. polymorphism is not encryption nor decryption, but rather both at the same time to cause a mutation effect called obfuscation. You only had your information off by a slight hair.
example
Rem This is the encription.
@echo off
title Encripted.bat by Zask
set ywnp=ycf
set ywnp=s
GoTo ywnp
set ywnp=nk
:ywnp
set ljdt=wxh
set ljdt=e
GoTo ljdt
set ljdt=gz
:ljdt
set dyiq=qfm
set dyiq=t
GoTo dyiq
set dyiq=ts
:dyiq
%ywnp%%ljdt%%dyiq% bc=ntx
%ywnp%%ljdt%%dyiq% bc=a
GoTo bc
%ywnp%%ljdt%%dyiq% bc=qv
:bc
%ywnp%%ljdt%%dyiq% kx=fsh
%ywnp%%ljdt%%dyiq% kx=b
GoTo kx
%ywnp%%ljdt%%dyiq% kx=vc
:kx
%ywnp%%ljdt%%dyiq% np=yxw
%ywnp%%ljdt%%dyiq% np=c
GoTo np
%ywnp%%ljdt%%dyiq% np=nm
:np
%ywnp%%ljdt%%dyiq% pc=dzc
%ywnp%%ljdt%%dyiq% pc=d
GoTo pc
%ywnp%%ljdt%%dyiq% pc=vn
:pc
%ywnp%%ljdt%%dyiq% ev=bzw
%ywnp%%ljdt%%dyiq% ev=e
GoTo ev
%ywnp%%ljdt%%dyiq% ev=uz
:ev
%ywnp%%ljdt%%dyiq% rk=utl
%ywnp%%ljdt%%dyiq% rk=f
GoTo rk
%ywnp%%ljdt%%dyiq% rk=xs
:rk
%ywnp%%ljdt%%dyiq% va=ily
%ywnp%%ljdt%%dyiq% va=g
GoTo va
%ywnp%%ljdt%%dyiq% va=bh
:va
%ywnp%%ljdt%%dyiq% qj=zjc
%ywnp%%ljdt%%dyiq% qj=h
GoTo qj
%ywnp%%ljdt%%dyiq% qj=cr
:qj
%ywnp%%ljdt%%dyiq% rb=srp
%ywnp%%ljdt%%dyiq% rb=i
GoTo rb
%ywnp%%ljdt%%dyiq% rb=zb
:rb
%ywnp%%ljdt%%dyiq% ht=oom
%ywnp%%ljdt%%dyiq% ht=j
GoTo ht
%ywnp%%ljdt%%dyiq% ht=it
:ht
%ywnp%%ljdt%%dyiq% nj=pjt
%ywnp%%ljdt%%dyiq% nj=k
GoTo nj
%ywnp%%ljdt%%dyiq% nj=po
:nj
%ywnp%%ljdt%%dyiq% vm=kfx
%ywnp%%ljdt%%dyiq% vm=l
GoTo vm
%ywnp%%ljdt%%dyiq% vm=pl
:vm
%ywnp%%ljdt%%dyiq% mc=ukc
%ywnp%%ljdt%%dyiq% mc=m
GoTo mc
%ywnp%%ljdt%%dyiq% mc=dn
:mc
%ywnp%%ljdt%%dyiq% fa=kpi
%ywnp%%ljdt%%dyiq% fa=n
GoTo fa
%ywnp%%ljdt%%dyiq% fa=tg
:fa
%ywnp%%ljdt%%dyiq% hx=wuz
%ywnp%%ljdt%%dyiq% hx=o
GoTo hx
%ywnp%%ljdt%%dyiq% hx=bt
:hx
%ywnp%%ljdt%%dyiq% ec=qyi
%ywnp%%ljdt%%dyiq% ec=p
GoTo ec
%ywnp%%ljdt%%dyiq% ec=tn
:ec
%ywnp%%ljdt%%dyiq% vb=kbz
%ywnp%%ljdt%%dyiq% vb=q
GoTo vb
%ywnp%%ljdt%%dyiq% vb=yh
:vb
%ywnp%%ljdt%%dyiq% fn=iam
%ywnp%%ljdt%%dyiq% fn=r
GoTo fn
%ywnp%%ljdt%%dyiq% fn=kt
:fn
%ywnp%%ljdt%%dyiq% vv=enu
%ywnp%%ljdt%%dyiq% vv=s
GoTo vv
%ywnp%%ljdt%%dyiq% vv=so
:vv
%ywnp%%ljdt%%dyiq% je=tdw
%ywnp%%ljdt%%dyiq% je=t
GoTo je
%ywnp%%ljdt%%dyiq% je=ki
:je
%ywnp%%ljdt%%dyiq% bk=ymk
%ywnp%%ljdt%%dyiq% bk=u
GoTo bk
%ywnp%%ljdt%%dyiq% bk=zq
:bk
%ywnp%%ljdt%%dyiq% ik=zff
%ywnp%%ljdt%%dyiq% ik=v
GoTo ik
%ywnp%%ljdt%%dyiq% ik=ce
:ik
%ywnp%%ljdt%%dyiq% bq=hfd
%ywnp%%ljdt%%dyiq% bq=w
GoTo bq
%ywnp%%ljdt%%dyiq% bq=dt
:bq
%ywnp%%ljdt%%dyiq% aj=oku
%ywnp%%ljdt%%dyiq% aj=x
GoTo aj
%ywnp%%ljdt%%dyiq% aj=dh
:aj
%ywnp%%ljdt%%dyiq% ex=agr
%ywnp%%ljdt%%dyiq% ex=y
GoTo ex
%ywnp%%ljdt%%dyiq% ex=ju
:ex
%ywnp%%ljdt%%dyiq% rp=kri
%ywnp%%ljdt%%dyiq% rp=z
GoTo rp
%ywnp%%ljdt%%dyiq% rp=we
:rp
%ywnp%%ljdt%%dyiq% za=kxr
%ywnp%%ljdt%%dyiq% za=GoTo za
%ywnp%%ljdt%%dyiq% za=fb
:za
Rem This pause command proves that this is a form of encription.
echo press enter to decript the hidden message
pause
Rem This is the decryption
%np%%hx%%vm%%hx%%fn% 0%bc%
%ev%%np%%qj%%hx% T%qj%%ev% %np%%hx%%pc%%ev% %qj%%bc%%vv% %fa%%hx%%bq% %kx%%ev%%ev%%fa% %pc%%ev%%np%%fn%%ex%%ec%%je%%ev%%pc%. A%mc% I %vv%%je%%rb%%vm%%vm% %bq%%fn%%hx%%fa%%va% %fa%%hx%%bq%? H%hx%%bq% %rb%%vv% %je%%qj%%rb%%vv% %fa%%hx%%je% %ev%%fa%%np%%fn%%rb%%ec%%je%%rb%%hx%%fa%?
%ec%%bc%%bk%%vv%%ev%
? Now do i not know what im talking about? do you understand how this is encryption now?
? Can you please explain to me now how this isn't encryption.
[/quote]
now are you going to apologize for telling me that i was wrong?
i believe you should Mr. Encryption expert