I hereby claim:
- I am incertia on github.
- I am incertia (https://keybase.io/incertia) on keybase.
- I have a public key whose fingerprint is 7EBB 37E5 0176 692D 4A9B 2B57 E9AF D3BC AC08 CA92
To claim this, I am signing this object:
{-# LANGUAGE DataKinds #-} | |
{-# LANGUAGE FlexibleContexts #-} | |
{-# LANGUAGE GADTs #-} | |
{-# LANGUAGE LambdaCase #-} | |
{-# LANGUAGE PolyKinds #-} | |
{-# LANGUAGE ScopedTypeVariables #-} | |
{-# LANGUAGE TemplateHaskell #-} | |
{-# LANGUAGE TypeApplications #-} | |
{-# LANGUAGE TypeFamilies #-} | |
{-# LANGUAGE TypeOperators #-} |
module SyntaxHighlight.Haskell exposing (..) | |
import Char exposing (isHexDigit, isDigit, isUpper) | |
import Parser exposing (Parser, succeed, oneOf, getChompedString, end, | |
chompIf, chompWhile, andThen, keyword, token, (|.), | |
problem, backtrackable) | |
import String exposing (fromChar, concat, all) | |
import SyntaxHighlight exposing (Source, Line, Token, Type(..)) | |
flip : (a -> b -> c) -> b -> a -> c |
#! /usr/bin/env python | |
from Crypto.Cipher import AES | |
import sys | |
def r16(): | |
with open("/dev/urandom", "r") as f: | |
return f.read(16) |
I hereby claim:
To claim this, I am signing this object:
# Maintainer: Levente Polyak <anthraxx[at]archlinux[dot]org> | |
# Contributor: Chris Andrews <christophersimonandrews [at] gmail [dot] com> | |
# Contributor: FadeMind <fademind@gmail.com> | |
# Contributor: Serge Victor <arch@random.re> | |
# Contributor: Krzysztof Wloch <wloszekk [at] gmail [dot] com> | |
# Contributor: Luke McCarthy <luke@iogopro.co.uk> | |
# Contributor: Will Song <incertia@incertia.net> | |
pkgname=fasm | |
pkgver=1.71.63 |
{-# LANGUAGE GeneralizedNewtypeDeriving #-} | |
{-# LANGUAGE DeriveFunctor #-} | |
import Data.Bits (Bits, zeroBits, xor) | |
import Data.Group (Group, invert, Abelian) | |
import Data.List (sort) | |
import Data.Monoid (mempty, (<>), Sum, getSum, Product, getProduct) | |
newtype Xor a = Xor { getXor :: a } | |
deriving (Eq, Ord, Read, Show, Num, Functor) |
from Crypto.PublicKey import RSA | |
from Crypto.Cipher import PKCS1_OAEP | |
import sys | |
# the following attack is due to Ellen Jochemsz and Alexander May | |
# see https://www.iacr.org/archive/asiacrypt2006/42840270/42840270.pdf | |
if len(sys.argv) < 2: | |
print "give m" | |
sys.exit(0) |
So after obtaining 10 copies of CS:GO gifts, I began debating whether or not it was feasible to write and maintain a completely undetectable cheat for at least 2 years, and I'm going to post some of the results of my basic levels of thinking here. Feel free to provide any evidence if anything I said is proven to be false and I will edit it in when I have the time.
In order to bypass VAC, some level of understanding is required. Here are the main points I ha
I hereby claim:
To claim this, I am signing this object: