r3nder

joined 1 year ago
[–] [email protected] 2 points 1 year ago

Yep - same use case, too. I'll keep persisting and see if I can get through.

[–] [email protected] 2 points 1 year ago (5 children)

Glad you could get it working over USB. In case you're still pursuing a network solution: What's your network topology and can your wife print over Windows?

[–] [email protected] 1 points 1 year ago

You could be a crypto bro on a Raspberry Pi.

Hell, someone might finally max out Flight Simulator X.

[–] [email protected] 2 points 1 year ago

Perun tier, through and through. Thank you.

[–] [email protected] 2 points 1 year ago (1 children)

Then ye be needin' a crew. Argh!

[–] [email protected] 11 points 1 year ago (1 children)

Yep! And I bet it'll turn out in a few decades that it will come out they were also behind the Doomerism we're seeing a lot of on social media these days. "Well it's too late so why try?" Is much more comfortable than "We have to sacrifice a lot of comfort, but if we all try really hard we can do it."

Weird thought, you ever think oil executives have nightmares about a global collective wanting to bring them to the guillotine?

[–] [email protected] 4 points 1 year ago* (last edited 1 year ago) (1 children)

Virtual machine testing is a good idea, but I wouldn't rely on it. Well written malware will check for a virtual environment and might even hold off executing if it detects it. Better malware will have already gained persistence as your testing for it.

[–] [email protected] 3 points 1 year ago

That's a paddlin'.

[–] [email protected] 5 points 1 year ago* (last edited 1 year ago)

First, I should note that I haven't come across (Readium?) LCP before - so I don't have experience with this particular method for DRM - I do however like to play with these sorts of things and have definitely come across some similar methods, etc.

I found a similar tool on GitHub which may help you to better understand what the process is for figuring out something like LCP: lcp-decrypt. I'm not sure how fresh your knowledge is on encryption - but it would help to have some knowledge of the process you're trying to reverse engineer.

If you happen to find a sample with of non-copyrighted material that has some sort of encryption you'd like examined, I'd be happy to have a look for educational purposes.

[–] [email protected] 2 points 1 year ago (2 children)

Reddit's unwavering stubbornness to continue spiraling is just plain sad. What a way to go.