Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Decryption aside, reverse-engineering anything is extremely difficult - I've seen projects like this take much, much longer than 3 days even when no encryption is involved. But as for the encryption itself, the author says himself: "the 'encryption' method was laughably simple." That may be "good" encryption from a hacker perspective, in that it's easy to work around, but it's not "strong" encryption in any book.


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: