Anonymous ID: 3ea4db May 4, 2020, 9:57 p.m. No.9034267   🗄️.is 🔗kun

>>9033832

 

Open the image, use Ghidra. What's hiding inside?

 

Can Ghidra be used to decomplie the JavaScript files of Twitter? Will we find out who wrote the AI code?

Anonymous ID: 3ea4db May 4, 2020, 10:05 p.m. No.9034376   🗄️.is 🔗kun

>>9034344

>EXE files, etc.

 

Be more specfic, as that is windows only. Things have moved on in the online world since native OS applications… see mobile apps, internet etc…

Anonymous ID: 3ea4db May 4, 2020, 10:37 p.m. No.9034758   🗄️.is 🔗kun

>>9034702

Correct. Email mailinf systems use this a similar technique to monitor who opens an email with a very small pixel image.

 

When the email is opened, a request to the server is sent to retrieve the image, and the image URL is monitored on the server, and uses those parameters to update who opened the email