top | item 47038098

(no title)

chasing0entropy | 15 days ago

I wonder if similar philosophy could be argued for encrypted containers given analysis of the binary would produce no dicernable file structures, names, or matching content at any scale.

Consider a software download site which only hosted fully encrypted container binaries. Those binaries use a time based key (say attempt to decrypt when the clock returns x value representing a future or past date reached naturally or manually...). Go a step further - a hidden container which always decrypts a partition with decoy content unless the clock returns a non-existent date (missing day in a leap year?)

IP ambivalence at its finest; aI tech bros would approve.

discuss

order

No comments yet.