Thursday, March 9, 2017

Let me spoof your miserable lifes. Hidden Markov models, random pseudo noise channels ...and PREDADOR...TARGET : worldwide internet virus infection

1. GET THE OPTICAL SIGNAL 

ltePBCHDecode

Physical broadcast channel decoding

Syntax

[bits,symbols,nfmod4,trblk,cellrefp] = ltePBCHDecode(enb,sym)
[bits,symbols,nfmod4,trblk,cellrefp] = ltePBCHDecode(enb,sym,hest,noiseest)
[bits,symbols,nfmod4,trblk,cellrefp] = ltePBCHDecode(enb,sym,hest,noiseest,alg)

https://www.mathworks.com/help/lte/ref/ltepbchdecode.html



2. virus ....Lets encrypt some random buffer A[] with some hashing algorithm so many
times N, so it will take us time period T.
After these calculations done, we have another random buffer B[] which

is used to encrypt/decrypt our "delayed" code.

There is no way to perform required N iterations using more than one
computer ('coz each time current buffer is encrypted), so minimal
decryption time is limited with maximal CPU speed.

If you will use computer which is fast enough, and use some time
to encrypt fucking random buffer, then you may be sure that
the same operation may not be done in a less time period.

So, each time the virus is active, it iterates N encryption cycles until
buffer A[] will be converted into B[].
After time T will be spent to decryption, virus will got buffer B[]
and use it to decrypt "delayed code".
3. ADC CAPTURE 
i only have this code
// defines for setting and clearing register bits
#ifndef cbi

#define cbi(sfr, bit) (_SFR_BYTE(sfr) &= ~_BV(bit))
#endif
#ifndef sbi
#define sbi(sfr, bit) (_SFR_BYTE(sfr) |= _BV(bit))
#endif

// set prescale to 16
sbi(ADCSRA,ADPS2) ;
cbi(ADCSRA,ADPS1) ;
cbi(ADCSRA,ADPS0) ;
4. AND FINALLY BIT MANIPULATION ( ATMEGA8 BIT MANIPULATION )

Cielo e terra (duet with Dante Thomas)