Okay it may be a command line parsing issue because I can get some tasks to run using network credentials.

As for the algorithm for the obfuscation it is not a basic number flipping routine and the average desktop user will not be reverse engineering it. That is not to say that someone with more advanced computer skills that takes on the task of trying to beat it won't figure it out in time.
And one could also run this through an advanced debugger and extract the code.

As with any tool like this, caution should be used when and where used.