(no title)
chasing0entropy | 15 days ago
Consider a software download site which only hosted fully encrypted container binaries. Those binaries use a time based key (say attempt to decrypt when the clock returns x value representing a future or past date reached naturally or manually...). Go a step further - a hidden container which always decrypts a partition with decoy content unless the clock returns a non-existent date (missing day in a leap year?)
IP ambivalence at its finest; aI tech bros would approve.
No comments yet.