Anonymous ID: 240802 Nov. 17, 2020, 4:23 p.m. No.11686198   🗄️.is 🔗kun   >>6337 >>6396 >>6564 >>6597 >>6655

>>11685870

>>11685532 (LB)

>Reverse engineering code by NSA open source software Chidra is like finding someone's DNA at a crime scene.

 

YES. When this was first released, I sent the NSA press release to a long time friend who is a computer engineer. He was impressed because of its implications and explained it to me using a real life hacking example. Back in 1985, he helped me write a program in C language that would mimic the log-on screen to a terminal at the University that I was attending at the time. This would allow me to collect anyone's username and password when they logged on to a terminal. (NOTE: This was before wide spread use of personal computers.) At the University, computer rooms contained terminal screens attached to a mainframe. Anyway, once we finished writing the program, there were 2 files, the C program file and the machine language file. The plan was to delete the C program file before running the machine language file so that it would be untraceable. I did this in my account, but we forgot to delete the C-program file in another friends account that we had used. Long story short, we got caught because of the C-program file left in my friends account. I took full responsibility for the whole episode and ended up having to do community service in the Dean's office for a month (fortunately, this was before federal laws for computer hacking). Anyway, the software Chidra allows you take what would amount to an .exe file containing machine language (think hexadecimals and shit) and reconstruct it into its language of origin.

 

IN THEORY, Chidra should be able to ID "untraceable" (MACHINE LANGUAGE FILES) election fraud computer programs used to flip votes.

 

https://fossbytes.com/nsa-open-sources-ghidra-reverse-engineering-linux-windows/