Glad you could get it working over USB. In case you're still pursuing a network solution: What's your network topology and can your wife print over Windows?
r3nder
You could be a crypto bro on a Raspberry Pi.
Hell, someone might finally max out Flight Simulator X.
Perun tier, through and through. Thank you.
Then ye be needin' a crew. Argh!
Yep! And I bet it'll turn out in a few decades that it will come out they were also behind the Doomerism we're seeing a lot of on social media these days. "Well it's too late so why try?" Is much more comfortable than "We have to sacrifice a lot of comfort, but if we all try really hard we can do it."
Weird thought, you ever think oil executives have nightmares about a global collective wanting to bring them to the guillotine?
Virtual machine testing is a good idea, but I wouldn't rely on it. Well written malware will check for a virtual environment and might even hold off executing if it detects it. Better malware will have already gained persistence as your testing for it.
That's a paddlin'.
First, I should note that I haven't come across (Readium?) LCP before - so I don't have experience with this particular method for DRM - I do however like to play with these sorts of things and have definitely come across some similar methods, etc.
I found a similar tool on GitHub which may help you to better understand what the process is for figuring out something like LCP: lcp-decrypt. I'm not sure how fresh your knowledge is on encryption - but it would help to have some knowledge of the process you're trying to reverse engineer.
If you happen to find a sample with of non-copyrighted material that has some sort of encryption you'd like examined, I'd be happy to have a look for educational purposes.
Reddit's unwavering stubbornness to continue spiraling is just plain sad. What a way to go.
Yep - same use case, too. I'll keep persisting and see if I can get through.