>We have the algorithm.
>Thank you @ Snowden.
Q, any chance this algorithm could be shared so Anons can find exploit vectors and workarounds? We might be able to mitigate the usefulness of this tech with little effort with the right type of approach. If not able to share, perhaps some pointers on what modules/source files/API/methods/etc… are the keys to the kingdom so we can tear down this virtual wall (assuming client side code is in playhere)…
There are tons of code Anons here who can break this down fairly easily and identify some potential sources of weakness (if they do in fact exist, which they probably do…) .
Please share what components/methods make this all work so we can get to work….