generate all possible SHA256. classify malware/not malware from source code. Create hash based detection, no need of analyzing or reverse engineering malware. #profit 
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
isn't that program synthesis?
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
That's more or less what I might end up doing with the Libre 2 encryption...
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
That'd still be a technique of reverse engineering.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
oh, i see you've found my notes on the ATF15xx bitstream
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Why save the encryption key when you could just take some time to brute force all the possible key combinations?
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Quantum computing generic programming?
-
dangit: "genetic" :-/
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.