>>1933You can create a sieve to find hidden processor instructions pretty easily, Domas proved that years ago and his sourcecode is still online.
As for what those instructions do, you'd have to be insane to mess with any of that stuff because of IME and its analogues. They'll know.
Domas did and found ring -2 exploits that were purpose built and hidden in ways that only really dedicated and intelligent engineers would ever find.
It's easy to find, but how many people can clean up popular sieves? Most people don't even understand how they work or that a lot of their limitations
are purpose built and easily removed. Eratosthenes is the most obvious example. I found it the same way anyone else would, and I rewrote it in c and
outputted over 10,000 prime numbers in less than a minute on a dual core laptop from the Bush era.
I meant to break it and see what would happen, it wasn't supposed to work. I didn't understand why it wouldn't because I didn't realize that
it was intentionally obfuscated and modified to not work. A lot of math is like that. There's a lot of setecastronomy stuff. I've know some spooks, NRO, even
a secret service guy who worked at the same NGO facility, which wasn't anything that glowed and boring. None of them seemed to know much about computers at all.
I had seen personally a penetration of a computer system, they used some obscure double encoding and it left artifacts on dozens of sheets. I reported it, explained it all, and
personally went to the CEO. I lost that job a week later. I can't go into details because of NDA, but it was gay and boring stuff. The computer guy that worked there did it for sure,
I could tell because of the way he tried to silence me and told others I didn't know what I was talking about. But, I had no proof of his guilt
Post too long. Click here to view the full text.