The short answer is that you would not use LSL, but pay some one in India to write a C# program for you!
The long answer is that you would "rebuild" the unknowns parts from inferences provided to the"client side" 3D engine.
Since quad 3Gb P4 class processors are already available and 8X/16X pretty close for very reasonable prices, it is reasonable to assume that "decrypting" the shape of the actual "prim" is something that you could pay SW engineer in india/China/wherever about $200 to get working.
In short "security by obscurity" is even less of a barrier than it was 30 years ago when it was first discredited.
A professor of the U of Chicago (I think) published an "position paper" on tracking $20 bills. It seems that if I give you 100 $20 bills then record their numbers every time they enter a bank, I can reconstruct ALL of your movements and purchases with about a 98% accuracy!
This was published over 20 years ago!
Cameras on freeways monitored by FBI/MI5/KGB/??? is really only the bare "tip of the iceberg".
The long answer is that you would "rebuild" the unknowns parts from inferences provided to the"client side" 3D engine.
Since quad 3Gb P4 class processors are already available and 8X/16X pretty close for very reasonable prices, it is reasonable to assume that "decrypting" the shape of the actual "prim" is something that you could pay SW engineer in india/China/wherever about $200 to get working.
In short "security by obscurity" is even less of a barrier than it was 30 years ago when it was first discredited.
A professor of the U of Chicago (I think) published an "position paper" on tracking $20 bills. It seems that if I give you 100 $20 bills then record their numbers every time they enter a bank, I can reconstruct ALL of your movements and purchases with about a 98% accuracy!
This was published over 20 years ago!
Cameras on freeways monitored by FBI/MI5/KGB/??? is really only the bare "tip of the iceberg".

My point was that using encryption as a copy protection mechanism is pointless since encryption aims to obscure the original data while it's en route from the source to the destination.
You *want* the destination/viewer to be able to decode it and since it's an open-sourced component humans will always have easy access, encryption doesn't even make it harder in any way, it would be entirely redundant.
)