I have deployed an application using the matlab application compiler and when I try to run to install and run the executable on a different PC, I can access and read through the original code.
The executable is exploded in the Temp directory e.g. path C:\Users\<USERNAME>\AppData\Local\Temp\<USERNAME>\mcrCache9.5
Following this, the code is not protected and users can easily reverse engineer the code of the application.
Is there any way to stop this?