Skip to content
Header Logo Without Tag
Search
  • Home
  • Articles
    • Code
    • Blog
    • Meta
    • Teach
  • Series
  • Tags
  • About
    • Newsletter
    • Privacy Policy
    • Terms of Service
    • World Domination Checklist
    • Wall of Fame
    • Wall of Shame

Series: Obfuscation Techniques

link to Obfuscation Techniques: Magic Numbers

Obfuscation Techniques: Magic Numbers

Magic numbers are numerical constants that have no clear meaning in the code and therefore make code harder to read. Anything that makes code harder to read is something we can use to obfuscate our...

Continue Reading
link to Obfuscation Techniques: No More Type Hints

Obfuscation Techniques: No More Type Hints

Type hinting is a nice tool that dynamic typing languages employ to make code more readable. As you can probably imagine, readability is not the goal with obfuscating code, so we ought to get rid of...

Continue Reading
link to Obfuscation Techniques: Visually Similar Characters

Obfuscation Techniques: Visually Similar Characters

One of the more nasty tricks we have in our obfuscation toolbelt is the reality that text has a lot of visually similar characters. If we sprinkle enough of them around, we can have some tough to...

Continue Reading
link to Obfuscation Techniques: Shadowing Built-in Functions

Obfuscation Techniques: Shadowing Built-in Functions

Continuing the series of obfuscation techniques, I thought up a sinister one recently that breaks the best practice of not shadowing built-in functions. I bet you'll have fun with this one!

Continue Reading
link to Obfuscation Techniques: Writing Malicious Comments

Obfuscation Techniques: Writing Malicious Comments

While considering the various obfuscation techniques, I was thinking about the role comments play in readability. After all, we've all heard that writing comments is a best practice, yet it's very...

Continue Reading
link to Obfuscation Techniques: The Yoda Conditional

Obfuscation Techniques: The Yoda Conditional

As a community, we spend a lot of time debating best practices. Perhaps it's time we establish actual bad practices. Or as I like to put them, obfuscation techniques. To kick off this new series, I...

Continue Reading

About Me

Welcome to The Renegade Coder, a coding curriculum website run by myself, Jeremy Grifski. If you like what you see, consider subscribing to my newsletter. Right now, new subscribers will receive a copy of my Python 3 Beginner Cheat Sheet. If newsletters aren't your thing, there are at least 4 other ways you can help grow The Renegade Coder. I appreciate the support!

Legal

The Renegade Coder is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com.






Longest Active Series

  • Journey to a PhD (55)
  • Coding Tangents (45)
  • How to Python (42)
  • Sample Programs Repo News (20)
  • The Autodidact's Guide to Python (11)
  • Discord
  • GitHub
  • Newsletter
  • Patreon
  • Portfolio
  • YouTube
  • Statistics
© 2016-2025 Copyright The Renegade Coder