oooh, the redbox uses full AES encryption!
-
Foone🏳️⚧️replied to Medea Vanamonde🏳️⚧️ ♀ last edited by
@MishaVanMollusq possibly it was fresh graduates from poland?
-
oh good they implemented both an internal C# dynamic plugin loading system, as well as the ability to craft arbitrary Invoke()s over TCP/HTTP.
So you can call any C# function from anywhere on the machine, I think?
-
-
@foone It would be amazing if you could figure out a way to create a program that empties the machine and secure wipes the drives...
-
Foone🏳️⚧️replied to Medea Vanamonde🏳️⚧️ ♀ last edited by
@MishaVanMollusq nope, disk image from one
-
@[email protected] (THANK YOU. I hate the factory paradigm)
-
@[email protected] probably not at all a security risk, no need to think twice about that one
-
@gudenau yeah we've talked about that in the discord. We've compiled a list of places it stores PII
-
@[email protected] so strange they went bankrupt.
-
Perish! 👻 (the thot)replied to Asta [AMP] last edited by
-
Asta [AMP]replied to Perish! 👻 (the thot) last edited by
@[email protected] @[email protected] I implemented the "factory/builder" thing once just to see if I was missing something about why writing four times the amount of code with two to three times the amount of repeated variables and functions across two nearly identical objects was a good idea, and yeah, no, that's a hundred+ lines I'll never get back that could have been a fucking init function
-
@[email protected] @[email protected] sometimes it seems people do this in Rust and I don't know why you would do that to yourself when you could just literally not.
-
Xandra Granade 🏳️⚧️replied to Asta [AMP] last edited by
-
Asta [AMP]replied to Perish! 👻 (the thot) last edited by
@[email protected] @[email protected] (oh, I guess I was talking about builders instead of factories but whatever just instantiate your object already)
-
Asta [AMP]replied to Xandra Granade 🏳️⚧️ last edited by
@[email protected] @[email protected]
"During debate over his nomination, a list of videotapes Bork had rented was leaked to the press, which led to the enactment of the 1988 Video Privacy Protection Act as a response. The leak was inspired by Bork's opposition to privacy protections beyond those explicitly outlined in the constitution."
baaaaahahahaha, this fucking guy though. this is awesome. -
@foone I now really want the forbidden knowledge of wheel of fortune’s bespoke multitasking programming language
-
@perplexes I'm still writing a disassembler, it'll be documented someday
-
So, quick summary:
Redbox went bankrupt and the machines are getting in the hands of individuals. The disk image has been dumped. The software is being reverse engineered: they're not currently very useful, since they need to talk to a server that's gone.But progress is being made
-
the devices themselves are windows 7 machines talking to the disc library. It's a small group of services talking to each other, mainly over HTTP
-
it's primarily written in enterprise-as-fuck C#, with some lua scripting, and the "HS" scripting language which seems to be proprietary to redbox machines.