Hacker Newsnew | past | comments | ask | show | jobs | submit | KaoruAK's commentslogin

The context is that the program I analyzed is the official WhatsApp installer, unmodified, downloaded from https://www.whatsapp.com/download?lang=es . Which means the WhatsApp supply chain is infected. Or WhatsApp was hacked.



Hello, this is a project that goes beyond Bitcoin’s level of decentralization. In the GitHub repository there is a .zip file. Once you extract it, there will be a folder. Inside that folder, you need to go to the distil directory. There you will find an .exe file — this is the program you need to run. It is 100% decentralized and does not have a single seed server.


Project Omega Implementation Test: https://osf.io/zft2n/files/fsz2m


This is just some random raw socket code which mentions scary words (EXPLOITS!!!) but actually does not contain any working exploits.

And you still haven't answered my question - that vulnerabile code that you plan to exploit, does it exist anywhere yet? Or is the whole thing something you made up?


The 'both were just signed' argument fails to address the structural anomalies. If Microsoft signed both, why does the malware use RSA-2048 while the official binary uses RSA-4096?. Furthermore, the malware carries a compilation timestamp from the year 2097, an APT technique to evade security filters. We aren't just seeing 'two signed files'; we are seeing a malicious binary (verified with sandbox escape and session theft) that shouldn't exist in Microsoft's signing pipeline, yet it carries a valid signature and was delivered via a zero-click attack from an official CDN. This points directly to a compromise of the trust infrastructure (Key compromise, CA breach, or verification bypass), not a routine signing event


To demonstrate that digital signatures are no longer valid


How does this demonstrate that?


Based on several analyses I've conducted—specifically on tria.ge, where it scored an 8/10 threat level for malware behavior—the most disturbing part is that the Microsoft digital signature remains valid. We are looking at a full cryptographic bypass.


Can you provide a writeup or article? You haven't provided enough information to back up your claims.


Hey Hacker News,

I'm currently running a script to exploit the Debian OpenSSL vulnerability (CVE-2008-0166) to potentially uncover Satoshi Nakamoto's private key. This vulnerability significantly reduces the search space for private keys, making it feasible to brute-force the key if Satoshi used a vulnerable version of OpenSSL on a Debian-based system.

Background: CVE-2008-0166 affected Debian and Ubuntu systems by using a predictable seed for the random number generator, reducing the entropy of key generation.

My Approach: My Python script iterates over all possible PIDs (1-65,536), simulating key generation on a vulnerable Debian system. For each PID, it generates potential private keys and checks if any match Satoshi's public address.

Code: Check out the complete code and Jupyter notebook implementation on my GitHub: https://github.com/POlLLOGAMER/Project_Satoshi_Nakamoto_Priv...

Execution Time: Estimating around 1.82 hours to complete on a modern CPU.

Conclusion: If Satoshi used a vulnerable OpenSSL version, this exploit should find his private key. Stay tuned for updates!

Feel free to check out the code or contribute. Let's see if we can solve this crypto mystery!


Hello HN,

We are sharing a hybrid SAT solver focused on practical efficiency (O(log n) + CDCL).

Results from the scale test:

Instance: hash 001344c9b3cb1626af1c7c35155cf26a (SAT Competence). Size: 4,751,686 Clauses and 1,313,245 Variables. Result: UNSAT Total time: 132.68 seconds (2 minutes, 12 seconds).

The Quaternion Dynamics phase (O(log n)) enabled a speed increase of over 50x in variables, keeping the total time low. Proving UNSAT in this time for an instance of this magnitude is proof of the method's efficiency.

Full log (Spanish Original): ============================================================ SAT SOLVER - DINAMICA POLINOMIAL DE QUATERNIONES O(log n) + PySAT = SAT/UNSAT CORRECTO ============================================================

Sube tu archivo .cnf o .cnf.xz:

• 001344c9b3cb1626af1c7c35155cf26a-bench_13439.smt2.cnf.xz(n/a) - 11905108 bytes, last modified: 7/12/2025 - 100% done Saving 001344c9b3cb1626af1c7c35155cf26a-bench_13439.smt2.cnf.xz to 001344c9b3cb1626af1c7c35155cf26a-bench_13439.smt2.cnf (1).xz

Archivo: 001344c9b3cb1626af1c7c35155cf26a-bench_13439.smt2.cnf (1).xz Tamano: 11905108 bytes Descomprimiendo .xz... Descomprimido: 108797713 caracteres

Parseando CNF... Variables: 1313245 Clausulas: 4751686

-------------------------------------------------- Ejecutando algoritmo híbrido... -------------------------------------------------- [1] Aproximación cuaterniónica O(log n)... Heurístico: 4102660/4751686 (86.34%) [2] Decisión exacta con PySAT (CDCL)...

================================================== RESULTADO: UNSAT Tiempo total: 132.6845 segundos Complejidad O(log n): 15.618034 Clausulas satisfechas (heuristico): 4102660/4751686 ==================================================

Archivo guardado: 001344c9b3cb1626af1c7c35155cf26a-bench_13439.smt2.cnf (1)_DIMACS_resultado.txt

Preview: c ================================================== c SAT Solver - Dinamica Polinomial de Quaterniones c O(log n) + CDCL (PySAT) = SAT/UNSAT CORRECTO c ================================================== c Archivo: 001344c9b3cb1626af1c7c35155cf26a-bench_13439.smt2.cnf (1).xz c Variables: 1313245 c Clausulas: 4751686 c Complejidad O(log n): 15.618034 c Clausulas satisfechas (heuristico): 4102660/4751686 (86.34%) c s UNSAT ...

The solver is available for testing with any known SAT Competence instance.

Link to Solver Files (OSF): https://osf.io/d5kg4/files/mpxgu Good luck with your Pandora's box!


I introduce the Law of Entropic Regression, a formal framework explaining why deterministic learning systems face inherent limits in convergence due to the asymmetric expansion of the error-space entropy.

To overcome this limitation, I define the Machine Unlearning operator and integrate it with conventional learning within a Machine Meta-Learning framework, achieving true asymptotic convergence.

The paper is openly available at OSF: https://doi.org/10.17605/OSF.IO/UXTJ9

Additionally, I provide a Jupyter Notebook demonstrating the Meta-Learning simulation using a 2D "moons" dataset. The simulation results confirm the framework's effectiveness:

Simulation finished Final correct ratio: 99.30% Final error ratio : 0.70% Final entropy : 0.0602 bits

These results illustrate how the combined learning and unlearning operators drive the global error toward zero while maintaining bounded informational entropy.

I welcome feedback from the community on potential applications and improvements.


Here’s the paper and code: https://doi.org/10.17605/OSF.IO/74DXZ

Here’s the code and how to implement it: https://github.com/POlLLOGAMER/RfC-Reinforcement-for-Creativ...

RfC trains agents to generate genuinely creative and valid outputs across any rule-based domain, from formal math to molecular design.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: