Every system has a weakness, and can be compromised, not to say that this does not present a genuinely difficult challenge.
It would be logical to think that it would be possible to eventually break it through recording raw processor activity on hardware level and then using binary, unfortunately backwards engineering binary with the software of today comes off as a rather inhuman task, if we were to use the recording of the electrical impulses themselves.
On other hand, with that type of recording system, it would probably be possible to categorize each individual pin in relation to the registers and operations, then again, I may honestly not be fully perceiving how this encryption actually functions.
IMO if this were me who figured it out
i would have done the paper, but then burnt all the math and stuff
viruses that are basically impossible for a AV to detect because they can be run while encrypted
[QUOTE=LordCrypto;38709369]IMO if this were me who figured it out
i would have done the paper, but then burnt all the math and stuff
viruses that are basically impossible for a AV to detect because they can be run while encrypted[/QUOTE]
The threat of viruses and other undesirable activity could hypothetically be neutralized through making (yet again) a CPU monitoring system that only allows specific algorithms to run, or a second CPU more or less, although that leaves the question of actually using it in a modern flexible manner, and not turning it into a pre-determined pong machine.
But yes, this whole thing is starting to open Pandora's boxes pretty quickly.
Well, once we get quantum processing on consumer computers in roughly 20 years, bruteforce will be the only logical choice for pretty much any code.
[url]http://en.wikipedia.org/wiki/Quantum_computer[/url]
There's currently a quantum computer at some college that can do simple calculations 100,000 times faster than today's standard computers. This means that bruteforce-styled code cracking will be almost instantaneous. That's why some companies are delving into image passwords.
[sp]I'm learning about this in my Chemistry class, it seems relevant, forgive me if it's not. I don't really know all that much about coding[/sp]
[QUOTE=BigJoeyLemons;38709466]Well, once we get quantum processing on consumer computers in roughly 20 years, bruteforce will be the only logical choice for pretty much any code.
[url]http://en.wikipedia.org/wiki/Quantum_computer[/url]
There's currently a quantum computer at some college that can do simple calculations 100,000 times faster than today's standard computers. This means that bruteforce-styled code cracking will be almost instantaneous. That's why some companies are delving into image passwords.
[sp]I'm learning about this in my Chemistry class, it seems relevant, forgive me if it's not. I don't really know all that much about coding[/sp][/QUOTE]
It is quite fully relevant, if you have a powerful enough brute forcer that is actually capable of breaking things within a reasonable time frame, then it leaves no other choice than to... make things as impossible to brute force as possible.
[QUOTE=LordCrypto;38709369]viruses that are basically impossible for a AV to detect because they can be run while encrypted[/QUOTE]
Except it still needs an implementation of a Turing/NAND/circuit/whatever machine to interpret the encrypted code.
This isn't some voodoo black magic encryption.
Not to mention that the machine is contained and has no input/output. Or memory.
While the possible outcomes of this cannot possibly be good, this is still software. Software exists solely because we allow it, and you cannot protect data with more data. You can only slow the process.
Just like every DRM and encryption scheme before this one, it WILL be broken. It might take longer than all the rest of them combined, but its doable.
-nreghegh-
[QUOTE=sixtyten;38709513]Except it still needs an implementation of a Turing/NAND/circuit/whatever machine to interpret the encrypted code.
This isn't some voodoo black magic encryption.
Not to mention that the machine is contained and has no input/output. Or memory.[/QUOTE]
Would it not be possible for virus creators to put together their own circuit/machine eventually? If a technology is popular enough, you usually start getting a pretty good idea of how it works, even if you do not have direct access to it.
[QUOTE=ThePuska;38697750][b]tl;dr:[/b]
It's now possible to make a program that makes the user go "what are you doing computer" and [b]the computer says "idk lol i just work here" and [i]only the program knows what's happening[/i][/b][/QUOTE]
Hasn't that always been the case for computers? :v:
[QUOTE=ief014;38711479]Hasn't that always been the case for computers? :v:[/QUOTE]
Not if you're using Linux.
Now all we need is to implement that into a computer and give it a mind of its own.
Sorry, you need to Log In to post a reply to this thread.