background preloader

Independents / Hackers

Facebook Twitter

MR L3GI0NN4iR3

Hackers by National Geographic. Hidden device distorts news on wireless networks, brews beer, is time machine. Georges Hotz. OP Sony. Telecomix. Jacob Appelbaum. Th3j3st3r. Grassroots Mapping. VIRGIL.GRiffith. WikiScanner. On December 21, 2012, a research group from Fondazione Bruno Kessler (it) released an open-source clone of WikiScanner called WikiWatchdog.[5] Design[edit] The tool's database contained 34,417,493 entries on anonymous edits (those by users who were not logged into Wikipedia) between February 7, 2002 and August 4, 2007.[3] Griffith stated that the database was constructed by compiling the anonymous edits included amongst the monthly public database dumps of Wikipedia.

WikiScanner

He claimed to have connected the organizations to their IP address with the assistance of the IP2Location, and through comparison had found "187,529 different organizations with at least one anonymous Wikipedia edit. "[3] WikiScanner only worked on anonymous edits that provided an IP address, not edits by anyone logged-in under a username. The WikiScanner FAQ notes that edits cannot be positively attributed to representatives of a company, only to a computer logged in to a company's network. Media coverage and reaction[edit] Skype protocol reverse engineered, source available for download. Hello, I'am Efim Bushmanov a freelance researcher and here is my project files on skype research.

Skype protocol reverse engineered, source available for download

While "Wall Street Journal" makes politics and skype today's trend, i want to publish my research on this. My aim is to make skype open source. And find friends who can spend many hours for completely reverse it. Now, most of hard things already done(for 1.x/3.x/4.x versions of skype). Including rc4 and arithmetic compression. You have unique chance to take a look on skype internal protocol and encryption. Here is yet a working "send message to skype" code. Part of this code, idb files and decrypted binares was get from VEST corporation. Downloads: --- oops, no more binaries, skype & microsoft & DMCA was here --- skype_part2_ida.zip --- oops, no more binaries, skype & microsoft & DMCA was here --- Here is a torrent file: magnet:? P.S. Skype protocol reverse engineered, source available.

I wouldn't venture to say this doesn't belong on HN since it really is interesting (if it was actually done correctly), but the files available for download are most likely illegal, were most likely created with pirated tools (IDA Pro/Hex-Rays, and yes, as a customer of theirs for over a dozen years I've reported it), and of course, the usual vilification of reverse engineering.

Skype protocol reverse engineered, source available

If you're reading this on a desktop or laptop system (rather than a phone), then you are most likely using an "IBM PC Compatible" even if you're using an Intel based Apple, and hence, you're using the fruits of completely legal reverse engineering. The way to do reverse engineering legally is to have one team reverse engineer the target and completely document how it works. Once it's documented, another disconnected team writes a new implementation from the documentation. This process is how you're using an IBM PC Compatible today, so yes, reverse engineering for compatibility is perfectly legal. 1.) 2.) Skype-open-source.