Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-4041-8081-

Cudder is a Liar

Name: Anonymous 2013-03-19 12:31

Cudder, where is your C/C++/Delphi decompiler? A few years agou you promised to deliver the IDA killer, but still you're silent. Not even a tech demo.

Name: Anonymous 2013-03-19 12:35

Cudder probably decided that since everyone runs x86 and Windows, there is no need to decompile code and Cudder's boss at Intel forbade any machine translation tools, because can break the Intel jail, allowing easily porting to ARM, MIPS or Lisp Machine.

Name: Anonymous 2013-03-19 12:38

Cudder is a rampant shitposter while anonymous and only uses a trip when whatever she's posting sounds mildly intelligent.

Name: Anonymous 2013-03-19 12:41

>>3
Yep! Sometimes Cudder forgets to turn off trip and that is how we know.

Name: Anonymous 2013-03-19 14:57

``My Love Is A Male Daughter'' by Cudder

http://archive.foolz.us/jp/thread/10506589

Name: Anonymous 2013-03-19 15:07

I'd rather he stayed the fuck in /jp/ and the fuck out of /prog/, filthy kike tranny.

Name: Anonymous 2013-03-19 15:57

>>5
Cudder will hack your anus.

Name: Kudder 2013-03-19 19:19

>>4
Proof or it didn't happen.

Name: Anonymous 2013-03-19 22:42

>>5,7
I am already fapping to pic 19 and 22:
ttp://1-media-cdn.foolz.us/ffuuka/board/jp/image/1361/82/1361820840213.jpg

Name: Anonymous 2013-03-20 0:56

cuddler

Name: Cudder !MhMRSATORI!fR8duoqGZdD/iE5 2013-03-20 6:11

We didn't "promise". We "had plans in the future".

If you want a "demo", here is the one from the announcement:
http://dis.4chan.org/read/prog/1320948466
[You are cautioned not to place undue reliance on forward-looking statements, which speak only as of the original date of this post. Neither REchan IHG nor its subsidiaries is under any duty to update any of the information presented.]

Name: Le Cudderberg 2013-08-11 1:37

>>1
What the fuck did you just fucking say about me, you little goy? I’ll have you know I graduated top of my class at Intel, and I’ve been involved in numerous secret viral marketing operations, and I have over 300 confirmed shills. I am trained in guerilla marketing and I’m the top merchant in the entire Israeli population. You are nothing to me but just another client. I will wipe your wallet the fuck out with swill the likes of which has never been seen before on this Earth, mark my fucking words. You think you can get away with saying that shit to me over the Internet? Think again, goy. As we speak I am contacting my social network of datamines across the USA and your IP is being traced right now so you better prepare for the storm, gentile. The storm that wipes out the pathetic little thing you call your life savings. You’re fucking broke, goy. I can be anywhere, anytime, and I can nickel and dime you in over seven hundred ways, and that’s just with my Macbook Pro™. Not only am I extensively trained in audience targetting, but I have access to the entire arsenal of the United States PRISM infrastructure and I will use it to its full extent to wipe your miserable shekel coffers off the face of the continent, you little goy. If only you could have known what holy retribution your little “clever” comment was about to bring down upon you, maybe you would have held your fucking tongue. But you couldn’t, you didn’t, and now you’re paying the price, you g*ddamn goy. I will shit peer pressure all over you and you will drown in it. You’re fucking conned, goy.

Name: Anonymous 2013-08-11 1:50

>>12
-18650/10, please necrobump more

Name: Anonymous 2013-08-11 2:18

2013-03-19 12:31

Name: Anonymous 2013-08-11 4:10

>>14
wow I totally didn't notice what the date and time of the op posting was until I read your ironic angry sage posting that is quoting that very date and time that is present and screaming in my face from the distant past at the top of this very very ancient and forgotten thread. Thank you for placing information at the bottom of the thread that would otherwise only be accessible at the top. My probability of responding to this thread thinking that it was created quite recently has drastically been reduced and I must repay you with gratitude for this incredible service that you have so generously bestowed upon me.

Name: Cudder !MhMRSATORI!fR8duoqGZdD/iE5 2013-08-11 4:38

This technology is too powerful to be released freely.

Name: Anonymous 2013-08-11 4:52

>>16
How much you asking for it?

Name: Anonymous 2013-08-11 5:20

2013-08-11 04:10

Name: Anonymous 2013-08-11 6:05

>>16
Is it because it can be used to decompile itself, thus defeating your affinity for closed-source shit forever?

Name: Anonymous 2013-08-11 6:16

DECOMPILE MY ANUS

Name: Anonymous 2013-08-11 7:52

>>22
Nice dubs bro

Name: Anonymous 2013-08-11 9:00

>>21
fuck off

Name: Cudder !MhMRSATORI!fR8duoqGZdD/iE5 2013-08-11 10:22

>>17
Not for sale.

>>19
No, the issues are more political. Remember !w4lolitaKs? She specialised in high-level RE techniques and drove most of the design effort. It's much more than a decompiler, which is sort of why we want to currently keep it restricted. One example I can pick out is the analysis technology can essentially find all the buffer overflows, off-by-ones, input validation errors, and anything else "wrong" with the code (for certain definitions of "wrong"). There are limitations like requiring huge amounts of processing power and storage to do this (several hundred cores and close to a TB of RAM total in the current system), but it would be a huge security threat to release it at the moment.

Name: Anonymous 2013-08-11 10:42

>>23
See if you can find some embarrassing DoS in the Windows networking code to crash the machine. Well, you could do the same for Linux but they'd patch it within 24h. They're no fun.

Name: Anonymous 2013-08-11 10:49

>>23
Nice science fiction. You from /x/ or something?

Name: Anonymous 2013-08-11 11:01

>>25
Cudder is fravia++

Name: Anonymous 2013-08-11 11:46

>>23
One example I can pick out is the analysis technology can essentially find all the buffer overflows, off-by-ones, input validation errors, and anything else "wrong" with the code (for certain definitions of "wrong").
Release it and let Windows crash. (That was a double entendre.)

Name: Anonymous 2013-08-11 12:40

>>27
Every operating system in existence would also crash. Linux distros would probably have it all fixed in a few weeks, though.

Name: Anonymous 2013-08-11 12:43

>>28
Heh, might even find one or two holes in VMS.

Name: Anonymous 2013-08-11 12:57

>>28
Every operating system in existence would also crash.
Not Genera for Lisp Machine.
>>29
Cudder's Jew crap probably won't even run on a real computer.

Name: Anonymous 2013-08-11 13:04

>>30
get banned, goy.

Name: Anonymous 2013-08-11 13:36

>cudder
>not gay

Name: Anonymous 2013-08-11 13:43

>>23
Tools like that already exist in one form or another, but they have a price tag and they suck. It would be a hacker's delight, and most companies will be too cheap to go back and fix everything it finds, so you are right. But still. Maybe the average neet exploit finder living in a basement doesn't have a tool like this, but you can bet your ass that the professionals do. By keeping it secret, you enable the ones with more resources to find exploits in software written by developers that don't have as powerful tools. So you aren't preventing hacking by releasing it, but enabling those that already have the capacity to continue to have an edge over the maintainers.

Name: Anonymous 2013-08-11 14:43

1 tb
omg x86 so uptee mised wow murcocode pogrom var e fest so binsh marc sisk soopremasee

Name: Anonymous 2013-08-11 14:48

>>32,34
Back to /g/, ``please''!

Name: Anonymous 2013-08-11 15:24

>>35
I would, but animefags on /g/ are really butthurt of their daily programming threads being created without an anime pic. Moreover, these threads are created legally, with normal images. And this makes them more butthurt. So, i need you to keep creating normal daily programming threads, not gay animed ones. Ty /prog/

Name: Anonymous 2013-08-11 15:29

>>35
The only person who should backplate getgoes is cudder, so she can talk about how Tel Aviv is the computing capital of the world thanks to Intel with her fellow shanda la /g/oyim.

Name: Anonymous 2013-08-11 15:38

I don't care about an IDA killer. I'd like to have a good SoftICE replacement though.

>>26
But Cudder isn't dead, and was never as haughty.

Name: Anonymous 2013-08-11 16:13

>>33

OMG you are such a buthurt delicious little faggot, pumpkins x

Name: Anonymous 2013-08-11 16:23

>>39
Is that supposed to be ironic? I can't even tell anymore.

Name: Anonymous 2013-08-11 16:25

>>39
kill yourself you cock sucking cunt die in a fire

Name: Anonymous 2013-08-11 17:10

I want Cudder to release his advanced decompiler so I could port my Windows programs to MIPS.

Name: Anonymous 2013-08-11 21:50

>>23
Remember !w4lolitaKs? She specialised in
LLLLLLLLLLLLLEEEEEEEEEEEEEEELLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLL
>LE TRIPLE KIKE TRANNY SAMEFAGGOT
>XDDDD

Name: Anonymous 2013-08-12 1:10

check 'em dubz

Name: Cudder !MhMRSATORI!fR8duoqGZdD/iE5 2013-08-12 4:05

>>24
"See if"? As if you don't think we've considered that? I wish I could disclose the details, but I'll just say it's more amusing to see the exploits that have been added by these "security patches"...

>>33
Maybe the average neet exploit finder living in a basement doesn't have a tool like this, but you can bet your ass that the professionals do.
It's not a "tool", it's a whole bloody system. Said exploit finder would likely not have the compute resources either, so we're just giving the professionals even more firepower if we released it; we realise not releasing it won't prevent hacking, but at least it won't make exploit rates rise dramatically.
>>34
We're basically trying to solve the Halting Problem here, and how far you can go depends on how much storage and processing power you have. There's nothing we can do about that; state/path analysis is naturally resource-intensive.

>>38
This is not a debugger (unless you mean that it can find the bugs for you...), nor a simple-minded single-use-case thing like IDA. The use cases are also completely different; it's not a realtime "load this program in a debugger and step through it to see what's happening", it's more like "analyse this program and see all the possible things it could do." I wouldn't call this a decompiler either, since being able to generate the semantically equivalent HLL code is just a side-effect of this process.

Name: Anonymous 2013-08-12 4:20

>>45
not releasing it won't prevent hacking, but at least it won't make exploit rates rise dramatically.
Just use Lisp! You can't analyze dynamically typed programs.

Name: Anonymous 2013-08-12 4:22

>>46
You can't analyze poorly written programs.
ftfy

Name: Anonymous 2013-08-12 4:39

>>45
I think I may have a solution.

Write letters to all maintainers of all the open source projects that matter. Tell them about your analysis tool that could potentially find a wide array of vulnerabilities in their code, and how you are reluctant to release it due to rise in exploits. Ask them to donate some funding to cover the cost of running the tool on their code base. Give them the final report generated and give them a few months to fix everything. Repeat for all projects. Once all the maintainers check it, release it.

Is it just source analysis or can it process binaries too? If the later then that's a more serious problem.

Name: Cudder !MhMRSATORI!fR8duoqGZdD/iE5 2013-08-12 4:57

>>46
Actually you can...

>>48
Is it just source analysis or can it process binaries too?
*facepalm*
"Source? We don't need no stinkin' source!"

Name: Anonymous 2013-08-12 5:10

>>49
Welp, nevermind. That is quite the hacker's delight.

Name: Anonymous 2013-08-12 5:11

Name: Anonymous 2013-08-12 5:12

Remember !w4lolitaKs? She specialised
she
is she attractive?

Name: Anonymous 2013-08-12 5:12

>>50
You mean crackers?

Name: Anonymous 2013-08-12 5:13

and is this program written in C?

Name: >>50 2013-08-12 5:14

Anyways, whatever cudder. I'm just going to make one in lisp that does the same functionality and stays below 500 MB of space. It ain't no thang.

Name: Anonymous 2013-08-12 5:15

>>11
Who is this ``we''?

Name: Cudder !MhMRSATORI!fR8duoqGZdD/iE5 2013-08-12 6:39

>>54
The server part is mostly C with some Perl, SQL, and XML (not in order of prevalence). Clients in C, Java, and PHP.

>>56
REchan IHG and its subsidiaries.

Name: Anonymous 2013-08-12 6:56

>>57
Ah so that was that awesome test-bed sit I was looking for. Too bad they went off the air. I was looking for it frantically once, but never found it. Now I know why.

Name: Anonymous 2013-08-12 8:20

>>49
Can it analyse the paths of haskell programs too?

Name: Anonymous 2013-08-12 11:45

>>49
Actually you can...
How exactly would you analyze (EVAL (SETQ X '`(EVAL (SETQ X ',X))))?

Name: Anonymous 2013-08-12 11:51

>>60
Very, very carefully.

Name: Anonymous 2013-08-12 19:20

When's REchan coming back up?

Name: Anonymous 2013-08-12 19:44

>>46,60
You're thinking about it wrong. Dynamically typed languages are implicitly convertible to unitype static languages. You can skip type unification entirely (see bottom and top types.)

Name: Anonymous 2013-08-12 20:05

>>63
Really?  Are you sure?  In practice, it might be a pain in the ass, but if you just want a HURR DURR proof I can just invoke Turing Completeness to make a unitype static language to build a computer that does anything a particular dynamically typed program does.  Realistically, I might be able to scan the context, then bundle together the power set of object classes (i.e. String_or_Integer_or_Hashmap foo; Integer_or_Tuple_of_Strings bar;), which I guess is what you're referring to as type unification.

Of course, perhaps I'm thinking about this wrong.  Could you elaborate?

Name: Anonymous 2013-08-12 20:47

>>64
I am not quite following your argument but I'll try.

The obvious example is asm.js. It accepts Javascript, does meaningful type-level analysis on it and interprets it differently if the code meets certain conditions.

In general though, analysis only begins at the type level, and you will need to unify types and reject improperly typed languages. Many static languages do this in their compilers, then proceed to erase the types entirely. But that isn't strictly where type theory ends, the programmer can write their own constraints and dispatch (eg. ADTs &c. but you don't need anything fancier than conditionals or computed jumps.)

So once you've gotten the compiler-recognized types unified according to the type system, you're left with the same problem as in dynamic languages: figuring out the second system.

Static types will give you a cheap advantage in analysis. You can express powerful semantics with the right type system. But you can express only lies with weak ones like C's. BCPL's is more honest and unityped.

What I'm saying is in general, you can't count on a static type system to tell you enough to do meaningful analysis on types alone, and once you get past the types, you have the same problem as with dynamic languages. Even if the types can provide enough information, the is no guarantee that the code is written to take advantage of that property.

The downward spiral is a program in any language can be written to be completely opaque to any particular means of analysis. You have to pick your target.

Name: Cudder !MhMRSATORI!fR8duoqGZdD/iE5 2013-08-13 1:58

>>59,60
Doesn't matter what produced it, as long as it's an executable binary. In other words no interpreted languages (but it's perfectly happy to, e.g., chew on the JVM or php.exe or python.exe or MSVBVM60.DLL or whatever.)

>>62
When we find a good reason to.

>>63-65
Our system is not based on any of this academic bullshite... one way to think about it could be "a more practical Coq".  Sometimes the best way to innovate is to ignore all the academics who have basically painted themselves into a corner. (See also: register allocation, rigid calling conventions, etc. I've had enough of the "use graph colouring" idiots. But that's a rant for another day...)

Name: Anonymous 2013-08-13 2:13

>>66
65 outlines problems that need to be solved for analysis to be successful. Whether or not you use academic bullshite methods you still have to solve the problems.

Name: Anonymous 2013-08-13 2:13

>>66
constraint satisfy my anus, cudder.

Name: Anonymous 2013-08-13 2:15

Is it just me, or Cudder became infected by Mentifex memes and solved AI?

Name: Cudder !MhMRSATORI!fR8duoqGZdD/iE5 2013-08-13 2:26

>>67
I have no idea what problems he's talking about with that incomprehensible drivel, but it works fine for what we've needed it for and if it doesn't then we fix it until it does. Nothing more than that.

Name: Anonymous 2013-08-13 3:28

>>70
Does it work though? If you don't even know what problems you're solving the 'analysis' can't be trusted.

Name: Anonymous 2013-08-13 3:29

Our system is not based on any of this academic bullshite
the best way to innovate is to ignore all the academics
I've had enough of the "use graph colouring" idiots

How did Arthur Murray hijacked Cudder's tripcode?

Name: Anonymous 2013-08-13 13:02

>>72
He programmed ANDRU to do it.

Name: Anonymous 2013-09-05 15:00

Do you know what Cudder really did with this software? (S)he sold it to the Mossad. Instead of giving it away to benefit humanity, Cudder sold it to an evil organization so they could create another Stuxnet and cause Fukushima 2.0.

Name: Anonymous 2013-09-05 17:09

bloody liar bloody hell bloody Cudder bloody trans pig

Name: Anonymous 2013-09-05 20:07

redpill me on Cudder pls

Name: Anonymous 2013-09-05 20:08

checkem

Name: Anonymous 2013-09-08 11:26

Cudder also told that hardware reverse engineering is prohibitively costly and no one would ever be able to hack Intel hardware. Yet STM microscopy is so cheap, even school pupils can built one from spare parts: https://news.ycombinator.com/item?id=700352 and that should be enough to start reversing anything.

Name: Anonymous 2013-09-08 13:51

x86 is shit.

Name: Anonymous 2013-09-08 13:52

Cudder is a girl!

Name: Anonymous 2013-09-08 14:20

>>80
Cudder has a pretty big penis for a girl.

Name: Anonymous 2013-09-08 14:23

"
>implying there is girls on internet
"

Name: Anonymous 2013-09-08 14:28

>>82
LEEEEEEERRRREEEEWELWLELELELELLLEEEEELLLL XDDDDDD :DDDD EGIGIN LE GREENMEMES GRO!!!!!!!! LELELELELELRLL

Name: Anonymous 2013-09-08 14:44

>>82
>imblying
i think i saw one once

Name: Anonymous 2013-09-08 14:46

>>84
was prolly a tranny

Name: Anonymous 2013-09-08 14:56

cutters too smart to be girl xD

Don't change these.
Name: Email:
Entire Thread Thread List