Hacker News new | past | comments | ask | show | jobs | submit login
[dupe] Why the NSA Called Me After Midnight and Requested My Source Code (medium.com/datadriveninvestor)
33 points by brunoluiz on Oct 28, 2018 | hide | past | favorite | 9 comments




Strange that they would need the source code. I would think that it should be easy to figure out what encryption algorithm it uses by looking at the binary if it wasn't blatantly advertised anyway.


They may not need it, but source code will allow them to read it faster and with a higher chance of getting it right.

It will also make it easier to re-run the decryption routine to get the original file/verify a cracking attempt instead of having to reimplement it correctly (possibly without having known-good test vectors to check if they got it right).


I expect what he wanted was the data structures. You know — length field at the start, then foo, then bar, then payload data.

(I've never broken "real" encryption, but I spent quite some time during my teens on, ah, improving the user-friendliness of computer games.)


one guess might be they wanted to know exactly how the software seeded the PRNG, to cut down their search space dramatically.


The binary would tell them that - in fact, it'd tell them that better than the source if there were any overlaps into garbage memory for example.

Wanting the source is purely for speedy analysis.


I've never done windows (95?) disassembly, but from what little VSC++ I did back in the day, for the sake of speed, I would probably have wanted to see the source code instead of disassembling! Don't know how good at this stuff the NSA was back then.


Why is it midnight when the NSA calls, in Connecticut (EST), and 1AM when he calls to his partner, IN CALIFORNIA, for the source code?


Must have been 4 hours later?




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: