Quote from: 1nz74g8 on December 20, 2012, 11:46 pmI took a look at the post and I am aware of the old hack. What is shitty is that it is getting wrapped up into a tool for sale openly for the script kiddies. There is MUCH deadlier forensic technology emerging. Most noteworthy, to me, being the SHA-1 Hahn Analysis Technique.Take a look at my other threads, tell me what you think of my observations and hacking techniques. I welcome the dialogue; up until now it has been kinda boring hanging around here. I love the LE acronym; I guess that is a bit much to type. Personally, I could care less about LE; I don't put myself in compromising situations and I've been down for a long time. This illicit trade bubbled up into my curiosity so I'm taking a look at it. I will not be an asshole; I will try to help. IMHO this is a crumbling castle and it is going to cost a few very much. I will end this comment by telling you that I have formal training involving encryption techniques and computer science in general. I have actually taken the time to step through and calculate most of the modern encryption protocols, step by step, by hand in a notebook. "I always assume that which one man can do, so can another."~Herbert O Yardley - NSAGood Luck,1nz74g8There's a few technologically savvy people around. There's even a couple who have really impressed me. But if you're hoping to find more people who can discuss the mathematics of symmetric and asymmetric cryptography... I'm afraid you're bound to be further disappointed.Even I've only stepped through the basic algorithms to understand them at that level. And I soon after forgot and wouldn't be able to do it again.Yes, I'm so cool I get to say "even I." Deal wid it. Or something. Oh yeah: "yo." :P