-
Notifications
You must be signed in to change notification settings - Fork 24
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cursed repo - why are we still unsure? #65
Comments
Yes, the source code is here, everyone can read, modify, and compile it.
I think the reason is probably due to pressure and deterrence from Microsoft. Unfortunately we can't verify who the witch really is. |
This seems to be the most common opinion, but it's just speculation and doesn't really make sense to me at least.
I guess it's plausible they just paid him to delete the account and walk away. All we have is speculation. |
Version1.1.2.1428 release notes make the claim:
But, this is not true. Only the
README.md
was changed. There are several examples where the old, so-called "fake" address still persists where it actually counts. For example in KexVer.h.1428 contains 1 hit for
i486
and 4 hits forgithub.com/vxiiduu
.I find this highly suspicious, since it seems unlikely to be a mistake. The author is well-aware that the URL appears in multiple places including in compiled binaries.
I accept the prima-facie claim that if
github.com/i486
is also compromised, then there would be no need to do this. However this may just be sloppy scam-craft.I've been researching for many hours now over a few months and my conclusion is that none of these repositories can be trusted, including the original vxiiduu repository. I have no hard proof to support this claim, but the history around this cursed software is concerning, specifically:
github.com
on the circumstances of the account closure, i.e. to settle the question of whether this account was voluntarily closed or forced closed.These concerns are coming from someone who desperately wants to use this software. Sadly, I think nothing short of a code audit will satisfy that the code is safe at this point.
The text was updated successfully, but these errors were encountered: