@alex That first one looks tough. But on the second one, couldn’t you use a similar method that programs use to create signatures for programs? I think it has something to do with using the original source code as a hash or something? I forget how it all works.