There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

ImplyingImplications ,

What is there not to trust? There are lots of disassemblers for binary files. Ghidra just comes with tools to make analyzing the resulting assembly code easier by doing things like graphing the jumps in code, allowing the user to give custom names to variables and functions, and attempting to convert the assembly into C code.

It would make sense that the NSA spends a lot of time reverse engineering programs. Not all hackers share their exploits publically, so one way to find unpublished exploits is by reverse engineering viruses and malware to find out what vulnerabilities are being exploited.

needthosepylons OP ,
@needthosepylons@lemmy.world avatar

Yeah but… isn’t it weird that they share their tools then?

I’m not into conspiracy stuff. It’s just that when I downloaded Ghidra for the first time, when I saw it was being published by the NSA, I had a “wow, didn’t expect that” reaction and it somehow became a shower thought.

It may be important to say that I’m not from the US. Where I live, I’m not sure things like that would happen or have happened. Well, or it did and I didn’t really pay attention.

InternetCitizen2 ,

They might enjoy the benefits of collaboration. Still the fact they are intimidating you with a public tool is also of benefit to their image as a powerful group. A large part of police work is intimidation.

slazer2au ,

The problem is the alternative costs thousands of dollars and is out of the reach of some people.

skullgiver ,
@skullgiver@popplesburger.hilciferous.nl avatar

I think the NSA would be rather foolish to distribute their malware to the exact target audience that’d be the first to figure out they’re infected.

The NSA serves to protect the USA, and giving security researchers the tools necessary to identify and reverse engineer malware fits perfectly within that goal. You can try to region lock that stuff, but the NSA isn’t stupid enough to think that’ll help.

If they want to hack you, they have much less obvious ways to get in. This is the organisation that adds PCBs to shipped computers and reflashes motherboard chips to hack targets.

Their real targets wouldn’t be running NSA software anyway, not without a deep dive into the closed off parts of the program.

Also, there’s no real alternative. There’s radare2 and IDA, and that’s about it really. Radare is an open source project that the could just as easily insert malware into, and IDA costs a ridiculous amount of money.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • random
  • lifeLocal
  • goranko
  • All magazines