Open
Description
Hi, I read about your research through the 404 Media article and noticed you wanted to look inside the Java archives. I have a little experience with Java reverse engineering so I peeked at the update.jar
linked from newsupdatesite.com
.
This is a summary of my results: https://notes.highlysuspect.agency/cia-jars.html
I'm not finished yet and I haven't found any exciting "smoking guns" or anything, but I did find:
- There is really basic string obfuscation ran over all the string constants in the jar, which is why grepping didn't turn up much
applet.configs
is also obfuscated with a little XOR encryption, the key is derived from the first eight bytes of the file- Deobfuscated, the file includes a date:
#Fri Feb 05 12:04:29 EST 2010
- Deobfuscated, the file includes a date:
- The jar includes, among other things, a very old copy of the
org.json
/JSON-java library and a (bespoke?) Base64 encoder/decoder- During this time
org.json
included the "The Software shall be used for Good, not Evil." clause in the license. Haha.
- During this time
If you want to apply my partially complete Enigma mappings you can
Metadata
Metadata
Assignees
Labels
No labels