Dave Horsfall <dave@horsfall.org> to Cryptography List 6/03/2019 Reply Reply all Forward Show original message Mark unread from here Mark message as spam Delete this message Not really crypto as such, but it does involve our favourite TLA... -- Dave ---------- Forwarded message ---------- Date: Wed, 6 Mar 2019 20:29:33 +1100 To: Dave Horsfall <dave@horsfall.org> Subject: Ghidra (NSA reverse engineering tool) made publicly available Awfully nice of the spooks: https://www.nsa.gov/resources/everyone/ghidra/. Hoping to increase the talent pool? Or is it a honeypot? :-) Part of some US government program to make their code publicly available: https://www.code.gov/ _______________________________________________ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography
Randy Bush <randy@psg.com> to Dave Horsfall 7/03/2019 Reply Reply all Forward Show original message Mark unread from here Mark message as spam Delete this message > Date: Wed, 6 Mar 2019 20:29:33 +1100 > To: Dave Horsfall <dave@horsfall.org> > Subject: Ghidra (NSA reverse engineering tool) made publicly available > > Awfully nice of the spooks: https://www.nsa.gov/resources/everyone/ghidra/. > Hoping to increase the talent pool? Or is it a honeypot? :-) > > Part of some US government program to make their code publicly > available: https://www.code.gov/ Microsoft: Hold my beer <https://blogs.windows.com/buildingapps/2019/03/06/announcing-the-open-sourcing-of-windows-calculator/> -- Alex Ionescu (@aionescu) _______________________________________________ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography
Yann Ylavic <ylavic.dev@gmail.com> to Cryptography List 8/03/2019 Reply Reply all Forward Show original message Mark unread from here Mark message as spam Delete this message On Fri, Mar 8, 2019 at 3:44 AM Randy Bush <randy@psg.com> wrote: > > > Date: Wed, 6 Mar 2019 20:29:33 +1100 > > To: Dave Horsfall <dave@horsfall.org> > > Subject: Ghidra (NSA reverse engineering tool) made publicly available > > > > Awfully nice of the spooks: https://www.nsa.gov/resources/everyone/ghidra/. > > Hoping to increase the talent pool? Or is it a honeypot? :-) > > > > Part of some US government program to make their code publicly > > available: https://www.code.gov/ > > Microsoft: Hold my beer <https://blogs.windows.com/buildingapps/2019/03/06/announcing-the-open-sourcing-of-windows-calculator/> At least white hats can now be sure that their exploit is really not evil :) Next is Miner? Yann. _______________________________________________ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography