107
107
Jun 3, 2020
06/20
Jun 3, 2020
by
Some Tard
software
eye 107
favorite 0
comment 0
Luks hash is a POC Proof of Concept to use a random base64 hash as a line from /dev/urandom | base64 as 10 kb on a random line number as an iso9660fs key ... This is as-is so expect what you would expect, only works for me on a btrfs type filesystem, then a second format, then a chmod -R 777 ... Drive Encryption is never a good enough idea, all you need is an embedded device to get into their system and the BIOS password is no good either ... The Mossad, GCHQ, Neighborhood/Community Watch, CIA,...
Topics: Drive Encryption, Shell Commands, Shell Scripts, Linux Terminal, Anti Forensics, nonsensical...
Earn $$. Learn What You Need to Get Certified (90% Off): https://nulb.app/cwlshop How to Disguise Payloads in Different Ways Full Tutorial: https://nulb.app/z515c Subscribe to Null Byte: https://goo.gl/J6wEnH Nick's Twitter: https://twitter.com/nickgodshall Cyber Weapons Lab, Episode 159 Payloads can't always be run easily. Often, you need to get around antivirus software and other defenses. The best way to do that is by hiding or obfuscating the payload. Today, in this episode of Cyber...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hide a Stager in One Line of Code Full Tutorial: https://nulb.app/x5i8r Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 153 A stager is how a hacker establishes a communication channel between them and their target in preparation for an attack. Today, on Cyber Weapons Lab, we'll explore how a stager works and how to execute any hidden Python commands you sneak onto a target's machine. Raspberry Pi Starter Kit:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Global warming has been used to argue for the redistribution of wealth (the Green New Deal) and for Sunday rest (as noted 2 weeks ago). The question addressed is, Can global warming support either of those philosophical/religious ends? 1. https://arstechnica.com/science/2015/06/updated-noaa-temperature-record-shows-little-global-warming-slowdown/ 2. https://www.drroyspencer.com 3. https://wattsupwiththat.com/2018/10/11/bombshell-audit-of-global-warming-data-finds-it-riddled-with-errors/ 4....
Topics: Second, Look, Seminars, Faith, Science, Loma, Linda, University, Church, CA, California,...
Naval Postgraduate School
26
26
Sep 1, 2019
09/19
Sep 1, 2019
by
Rogers, Alexis L.; Sowers, Ryan
texts
eye 26
favorite 0
comment 0
Buffer overflow and heap overflow injection attacks have been studied for some time. Recent techniques to prevent execution of payloads inserted into memory have been successful by using stack canaries, non-executable stacks, and address space layout randomization (ASLR). Attackers now use a technique called return oriented programming to maliciously execute code without ever inserting such a payload into memory. They do so by identifying binary snippets in the original program that constitute...
Topics: buffer overflow, return oriented programming, ROP, gadget, return instruction pointer, stack...
97,564
98K
Aug 12, 2018
08/18
Aug 12, 2018
by
Morgan Schell
texts
eye 97,564
favorite 14
comment 0
The master of baiting a consumer to believe anything is the academic convinced of their own pragmatism, that the convincing of an idea is up to them rather than up to whom they are trying to convince. There is a point at which the wise man is defined for us and the academic is defined for us, the definitions of which grant us a hyperfact to base our reason to value on. Our valuation, the nature of subjects and situations, the understandable, are up for mastery. What does the metaphysical...
Topics: philosophy, abiotic, able, ableism, abolish, abolitin, absolutism, abstract, absurd, abuse,...
Skilled attackers continually seek out new attack vectors and effective ways of obfuscating old techniques to evade detection. Active defenders can attest to attackers’ prolific obfuscation of JavaScript, VBScript and PowerShell payloads given the ample availability of obfuscation frameworks and their effectiveness at evading many of today’s defenses. However, advanced defenders are increasingly detecting this obfuscation with help from the data science community. This approach paired with...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, obfuscation, daniel...
234
234
Feb 27, 2018
02/18
Feb 27, 2018
by
Knowledge for LIFE (Know4LIFE) YouTube Channel
movies
eye 234
favorite 4
comment 0
Discussing the book now banned on Amazon "The Secret Relationship Between Blacks And Jews", penned by the Nation Of Islam, who used quotes and information taken from Jewish Encyclopedias etc. If one understands whom controls Amazon, MSM, Social Media, Hollywood etc, one cannot be surprised at the banning of the book, which proves categorically Jewish domination of the Transatlantic Slave Trade.
Topics: Jewish Domination, Obfuscation, Lies, Cover Up, Transatlantic Slave Trade, Dr Tony Martin, Black...
23
23
Nov 2, 2017
11/17
Nov 2, 2017
by
DEFCONConference
movies
eye 23
favorite 0
comment 0
Attackers, administrators and many legitimate products rely on PowerShell for their core functionality. However, its power has made it increasingly attractive for attackers and commodity malware authors alike. How do you separate the good from the bad? A/V signatures applied to command line arguments work sometimes. AMSI-based (Anti-malware Scan Interface) detection performs significantly better. But obfuscation and evasion techniques like Invoke-Obfuscation can and do bypass both approaches....
Topics: Youtube, video, Science & Technology, DEF CON 2017, DEF CON 25, DEF CON, DEFCON, Security...
UAVs provide exceptional capabilities and a myriad of potential mission sets, but the ability to disguise where the aircraft takes off and lands would expansively advance the abilities of UAVs. This thesis describes the development of a nonlinear estimation algorithm to predict the terminal location of an aircraft and a trajectory optimization strategy to mitigate the algorithm's success. Vehicle paths are generated using a matrix-based quadratic trajectory computation method. The paths are...
Topics: unmanned aerial vehicles, path planning, optimization, obfuscation, extrapolation, mitigated
It's time to talk code security when developing applications to try to stop people from stealing our precious code and apps. We discuss the different methods we have used to attempt to obfuscate our code and the tools we use to peek into our own code. When it comes to security, it is more than just the executable we ship as we have to be aware of everything happening on the device such as in app purchases, certificates, web requests, and a bunch of other things. We discuss all this and more on...
Topics: Podcast, Xamarin, iOS, Android, UWP, Microsoft, .NET, C#, F#, Machine Learning, AI, Apps, Apple,...
There is no process or system capable of detecting obfuscated network traffic on Department of Defense (DOD) networks, and the quantity of obfuscated traffic on DOD networks is unknown. The presence of this traffic on a DOD network creates significant risk from both insider-threat and network-defense perspectives. This study used quantitative correlation and simple network-traffic analysis to identify common characteristics, relationships, and sources of obfuscated traffic. Each characteristic...
Topics: Tor, onion routing, obfuscation, network traffic analysis, multi-attribute analysis
To learn more about Pluggable Transports, visit this link: https://blog.torproject.org/blog/breaking-through-censorship-barriers-even-when-tor-blocked Learn how to use PTs: https://extra.torproject.org/blog/2016-08-PT-animation/pluggable_transports-howto.png Download this video: https://extra.torproject.org/blog/2016-08-PT-animation/pluggable_transports-animation.mp4 Source: https://www.youtube.com/watch?v=DkEqWGF3cvg Uploader: Tor Project Upload date: 2016-08-03
Topics: Youtube, video, Science & Technology, Tor, Pluggable Transports, Censorship, Circumvention...
50
50
Jan 17, 2016
01/16
Jan 17, 2016
by
Alan Watt ~ Cutting Through the Matrix
audio
eye 50
favorite 0
comment 0
Alan Watt~Cutting Through the Matrix~1546~Jan. 17, 2016 "Cutting Through the Matrix" with Alan Watt (Blurb, i.e. Educational Talk) "Bankers' Bail-in Means Cypress'd and Greece'd, Bankers' Haircut Means Sheep to Be Fleeced - Part 2" © Alan Watt Jan. 17, 2016
Topics: Bankers' Bail-ins - Portugal - Single Resolution Board, Brussels - Everything Meant for World...
27
27
Oct 12, 2014
10/14
Oct 12, 2014
by
Alan Watt ~ Cutting Through the Matrix
audio
eye 27
favorite 1
comment 0
Alan Watt~Cutting Through the Matrix~1465~Oct 12, 2014 "Shame is Lame: Fool Me Once Shame on You, Fool Me Twice Shame on Me, Fool Me Thrice......" © Alan Watt Oct. 12, 2014
Topics: Human Adaptation - "Keeping You Safe" - Anti-Terrorism Bills - Spying on the Public -...
147
147
Oct 12, 2014
10/14
Oct 12, 2014
by
Alan Watt ~ Cutting Through the Matrix
audio
eye 147
favorite 0
comment 0
Alan Watt~Cutting Through the Matrix~1464~Oct 5, 2014 Oct. 5, 2014 "Cutting Through the Matrix" with Alan Watt (Blurb, i.e. Educational Talk) "Noah Tipped Off for Coming Change, The Big Boss, The Climate Would Rearrange" © Alan Watt Oct. 5, 2014
Topics: "Greed is Good" , Transfer of Employment , Juggling Credit Cards , Edward Bernays , Use...
23
23
Jun 26, 2014
06/14
Jun 26, 2014
by
Hak5
movies
eye 23
favorite 0
comment 0
Finishing the Drone's last setting before madden flight! Our Open Source Autopilot series continues with Piotr Esden-Tempski and Darren Kitchen. Plus, Using FauxCrypt to create some obfuscation int your text - Shannon Morse reports. All that and more, this time on Hak5! -~-~~-~~~-~~-~- Please watch: "Bash Bunny Primer - Hak5 2225" https://www.youtube.com/watch?v=8j6hrjSrJaM -~-~~-~~~-~~-~- Source: https://www.youtube.com/watch?v=ZwvRYLuXi0w Uploader: Hak5
Topics: Youtube, video, Science & Technology, drone, quadcopter, multirotor, multicopter, autopilot,...
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2013ams/materials/ PRESENTATION ABSTRACT: The goal of mass malware is to successfully run on as many different platforms and applications as possible. The goal of 0-day malware is to exploit a narrow set of hosts. In recent 0-day attacks against Adobe Flash Player and Adobe Reader, we have observed exploits combining the features of mass malware -- obfuscation and complexity -- with the quality that makes up a successful 0-day...
Topics: Youtube, video, Science & Technology, vulnerability, sandboxing, pdf, malware, hackinthebox,...
60
60
Dec 13, 2012
12/12
Dec 13, 2012
by
Dovid Katz
movies
eye 60
favorite 0
comment 0
Speaker: Dovid Katz Title: Holocaust Obfuscation: The 21st Century Version of Denial Location: Fordham University Dovid Katz, cultural historian, renowned Yiddishist and scholar of Lithuanian Jewry and editor of DefendingHistory.com, speaks about the problematic situation of Lithuanian and European Holocaust history revisionism and the role played by antisemitism.
Topics: Antisemitism, charles asher small, Dovid Katz, Dr. Doron Ben-Atar, europe, Fordham University,...
PRESENTATION MATERIALS: http://conference.hitb.org/hitbsecconf2012kul/materials/ PRESENTATION ABSTRACT: Malware is widely acknowledged as a growing threat with hundreds of thousands of new samples reported each week. Analysis of these malware samples has to deal with this significant quantity but also with the defensive capabilities built into malware. Malware authors use a range of evasion techniques to harden their creations against accurate analysis. The evasion techniques aim to disrupt...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox, bsdaemon, rodrigo rubira...
318
318
Jul 9, 2010
07/10
Jul 9, 2010
by
Recon
movies
eye 318
favorite 0
comment 0
Swizzor is a malware family that was first seen on the Internet in 2002 and, since then, researchers have collected millions of different binary samples. The reason so many different files exist is that Swizzor uses strong server-side binary obfuscation to evade antivirus detection and slow down manual reverse engineering. In this talk, we will present a set of tools and techniques we have developed to understand and defeat Swizzor's binary protection. Upon execution, the custom packer goes...
Topics: recon_2010_pierre-marc_bureau_and_joan_calvet, Recon 2010, Reverse Engineering, Swizzor, Obfuscation
154
154
Jun 1, 2010
06/10
Jun 1, 2010
by
Hak5
movies
eye 154
favorite 0
comment 0
The Hack Across America series continues in week 5 with Eighty of DualCore and PDF Exploits and malware analysis. Darren and Shannon take your questions at the Hak5 Springfield MO Meetup, and the perfect screenshot utility in this week's Snubs Report. Source: https://www.youtube.com/watch?v=xfze8YGNvhQ Uploader: Hak5
Topics: Youtube, video, Entertainment, dualcore, dual core music, eighty, Nerdcore, dual core, int80, c64,...
40
40
Oct 1, 2009
10/09
Oct 1, 2009
by
Alan Watt ~ Cutting Through the Matrix
audio
eye 40
favorite 0
comment 0
Alan Watt CTTM LIVE on RBN 420 Break Out, Risk Trouble, Go Burst Your Bubble, Oct 1, 2009 Oct. 1, 2009 Alan Watt "Cutting Through The Matrix" LIVE on RBN: Poem Copyright Alan Watt Oct. 1, 2009: Break Out, Risk Trouble, Go Burst Your Bubble: "Organizations at the Top just Scheme and Laugh As We Witness the Power of the Psychopath, The Long-Laid Plans of This Nefarious Club Say They'll Own the World, We Get the Rub, Their Corporations with Full-Time Lobbies Convincing Government...
Topics: Red October, Kiss of Death, Revolutions, Matrix Reality, Respectable Businessmen and Politicians,...
30
30
Nov 11, 2008
11/08
Nov 11, 2008
by
Alan Watt ~ Cutting Through the Matrix
audio
eye 30
favorite 0
comment 0
Alan Watt CTTM LIVE on RBN 192 Tripping The Script Nov 11, 2008 Nov. 11, 2008 Alan Watt "Cutting Through The Matrix" LIVE on RBN: Poem Copyright Alan Watt Nov. 11, 2008: Tripping the Script: "Financial Disaster is Good for The Plan, For a New World Order--Yes We Can, Says Minister Brown's Upcoming Meeting, Where He and Other Actors Greeting, While Violent Extremism from the Greenies Talking to Plants, Inwardly Meanies, Who, Because of Intense 'Doctrination, Wish to Eradicate the...
Topics: World of Service, Global Society, Financial Bubble, Crash, New Economic Society, New World Order,...
19
19
movies
eye 19
favorite 0
comment 0
Topics: Mind Control Methodologies, Obfuscation, Individuality vs. Culture, Worldview Poisoning, Human Nature, Conditioning, Value Of The Individual, Change https://www.whatonearthishappening.com/podcast-in-order
Topics: Psychology, Podcast, Mark Passio, Obfuscation, Mind Control, Control, Individuality, Culture,...
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives. First, we look at identifying techniques to determine web user identities from a server perspective. Second, we will look at obfuscating techniques from a user whom seeks to be anonymous. Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives. First, we look at identifying techniques to determine web user identities from a server perspective. Second, we will look at obfuscating techniques from a user whom seeks to be anonymous. Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives. First, we look at identifying techniques to determine web user identities from a server perspective. Second, we will look at obfuscating techniques from a user whom seeks to be anonymous. Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
352
352
movies
eye 352
favorite 0
comment 0
With the classic narcissist, language is used cruelly and ruthlessly to ensnare one's enemies, to saw confusion and panic, to move others to emulate the narcissist ("projective identification"), to leave the listeners in doubt, in hesitation, in paralysis, to gain control, or to punish. Language is enslaved and forced to lie. The language is appropriated and expropriated. It is considered to be a weapon, an asset, a piece of lethal property, a traitorous mistress to be gang raped into...
Topics: narcissist, narcissism, language, speech, lecture, semiotics, semantics, obfuscation, ambiguity,...
384
384
texts
eye 384
favorite 0
comment 0
Marble Framework 31 March, 2017 Today, March 31st 2017, WikiLeaks releases Vault 7 "Marble" -- 676 source code files for the CIA's secret anti-forensic Marble Framework . Marble is used to hamper forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA. Marble does this by hiding ("obfuscating") text fragments used in CIA malware from visual inspection. This is the digital equivallent of a specalized CIA...
Topics: Wikileaks, CIA, secret, anti-forensic, Marble Framework, malware, obfuscation, malware code,...
196
196
-
-
-
by
SWUS, Sovereign Wealth US, Lee Joseph Common
image
eye 196
favorite 2
comment 0
Folder Downloads I've prepared on the cloud for archiving have been being blocked. Contained here are several screenshots of folders being deleted remotely from my computer along with several just for "fun" pics I feel are relevent.
Topic: MIT, pics, meme, obfuscation, supression, imposed,
Security of integrated circuits (ICs) has emerged as a major concern at different stages of IC life-cycle, spanning design, test, fabrication and deployment. Modern ICs are becoming increasingly vulnerable to various forms of security threats, such as: 1) illegaluse of hardware intellectual property (IP) \IP Piracy. 2) Illegal manufacturing of IC\ IC Piracy. Designing of confidential ICs must satisfy many design rules in order to rectify the various attacks and to protect the secret data. Based...
Topics: Hardware security logic obfuscation, Flipped Scan Chain, On-Chip Scan Chain Comparison, AES,...
98
98
data
eye 98
favorite 0
comment 0
star wars code
Topics: code, obfuscation
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives. First, we look at identifying techniques to determine web user identities from a server perspective. Second, we will look at obfuscating techniques from a user whom seeks to be anonymous. Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
977
977
audio
eye 977
favorite 1
comment 1
An example of how to display a clickable email address readable by humans, not by automated email harvestors.
( 1 reviews )
Topic: email minilogo obfuscation munging
38
38
movies
eye 38
favorite 0
comment 0
A brief disproving of this kike ideology that keeps you enslaved & dumbed down with obfuscation that is designed to complicate & hinder true scientific progress. Please support me by spreading this material & all in my collection. Please support for your sake the N.S.E.W.P. & rise triumphant, strong, & courageous just like our fallen comrades of the past. Unfortunately it looks as if the archive has darkened the already poor picture, maybe adjust the screen controls.
Topics: Isaac Newton, Isaac, Newton, Newton's laws, Newton's 3rd law, Newton's third law, shill, kike lies,...
99
99
data
eye 99
favorite 0
comment 0
c-program-1
Topics: code, obfuscation
56
56
data
eye 56
favorite 0
comment 0
poem code
Topics: code, obfuscation
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives. First, we look at identifying techniques to determine web user identities from a server perspective. Second, we will look at obfuscating techniques from a user whom seeks to be anonymous. Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
14
14
movies
eye 14
favorite 0
comment 0
Topics: Energy Independence, Mind Control, Methods Of Manipulation, Obfuscation, Simplicity vs. Complexity, Principles vs. law, Dominion vs. Fear Of Punishment, Gnosis vs. Belief, Individuality vs. Culture https://www.whatonearthishappening.com/podcast-in-order
Topics: Mark Passio, Psychology, Energy Independence, Free Energy, Control, Mind Control, Psychology,...
20
20
movies
eye 20
favorite 0
comment 0
Topics: Energy Independence, Mind Control, Methods Of Manipulation, Obfuscation, Simplicity vs. Complexity, Principles vs. law https://www.whatonearthishappening.com/podcast-in-order
Topics: Psychology, Podcast, Energy Independence, Free Energy, Mind Control, Psychology, Manipulation,...
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives. First, we look at identifying techniques to determine web user identities from a server perspective. Second, we will look at obfuscating techniques from a user whom seeks to be anonymous. Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives. First, we look at identifying techniques to determine web user identities from a server perspective. Second, we will look at obfuscating techniques from a user whom seeks to be anonymous. Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives. First, we look at identifying techniques to determine web user identities from a server perspective. Second, we will look at obfuscating techniques from a user whom seeks to be anonymous. Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives. First, we look at identifying techniques to determine web user identities from a server perspective. Second, we will look at obfuscating techniques from a user whom seeks to be anonymous. Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
48
48
data
eye 48
favorite 0
comment 0
tree code
Topics: code, obfuscation
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives. First, we look at identifying techniques to determine web user identities from a server perspective. Second, we will look at obfuscating techniques from a user whom seeks to be anonymous. Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives. First, we look at identifying techniques to determine web user identities from a server perspective. Second, we will look at obfuscating techniques from a user whom seeks to be anonymous. Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
62
62
data
eye 62
favorite 0
comment 0
camel code
Topics: code, obfuscation
18
18
audio
eye 18
favorite 0
comment 0
feedback / obfuscation workshop 2021
Topics: livecoding, obfuscation