D
Deleted User
Guest
OP
There's no access. They just dumped it.Yes we should, only 7 months and access to Kernal. Think about it for a second.
There's no access. They just dumped it.Yes we should, only 7 months and access to Kernal. Think about it for a second.
Still, they haven't got access.With that they can get access.
First it is KERNEL ! not fucking kernalYes we should, only 7 months and access to Kernal. Think about it for a second.
You're so NEET, jesus,As I just said, they could get access with the code. You're just going to keep on dragging on this sentence.
Why are you swearing? Just because of a typo?First it is KERNEL ! not fucking kernal
so if you don't even know how to spell it or what it is i doubt you know what you are talking about
plus it is just a dump, not an access
and no it isn't a dump that will make the access to it way easier
Are you an idiot, they dumped it, that mean they don't have the code but just the binaryAs I just said, they could get access with the code. You're just going to keep on dragging on this sentence.
With that they can get access.
Because i hate people thinking they know something when they are talking trashWhy are you swearing? Just because of a typo?
Code --> Deencrypt --> Find an exploit into gaining access. --> Boom.Are you an idiot, they dumped it, that mean they don't have the code but just the binarie
finally someone who understands my painplus "kernal" is one of the word that annoys me the most
Didn't you just say it's not a real word? So, you find a word annoying that is not even a word?Because i hate people thinking they know something when they are talking trash
plus "kernal" is one of the word that annoys me the most
Nah it don't work like that, and code isn't encrypted but compiledCode --> Deencrypt --> Find an exploit into gaining access. --> Boom.
Code --> Deencrypt --> Find an exploit into gaining access. --> Boom.
So much people make the mistake that it is oneDidn't you just say it's not a real word? So, you find a word annoying that is not even a word?
If anyone's talking trash it's you. Furthermore, you can do what I just said. It's like a 3ds .plg it's possible to get the sources but no one can be bothered to do it as it's unnecessary.Nah it don't work like that, and code isn't encrypted but compiled
so at best you can dissasemble it to get some unreadable garbage
it take months to find an exploit from assembly code
stop talking trash
You really are a moron, you just proved that you know nothing about what you are talking, you don't know how computers work and you don't even see the diference between code and binary executable, and encryption and compilingIf anyone's talking trash it's you. Furthermore, you can do what I just said. It's like a 3ds .plg it's possible to get the sources but no one can be bothered to do it as it's unnecessary.