Users access content using a variety of formats, where some formats provide stronger encryption or protections than others. Content transmitted over open protocols may expose content to unauthorized third parties or enable unauthorized use of the content. The content may be protected by converting the content to a set of instructions on a user device, where the instructions correlate characters to identifications and outlines of the characters with instructions for rendering the characters. Different segments of content may have different mappings between characters, identifications, and outlines to add time or resource use to attempts to reverse engineer the instructions.