unknownone@
Quote:
|
The people who made most of the original proxies - chocoman, qonquer, behelit, ultimation etc - are all capable of cracking new encryptions if need be, had they thought it was a difficult task they would've stuck to using memory based tools too.
|
exactly, when the encryptions are easy, they can do it
when it is slightly complicated
1. give up (maybe dont even think it worths time cracking it)
2. Wait for other people to crack it, steal the method and create its own proxy
3. like now, trying, but seems no progress
i have nothing against proxy. i always think proxy are > other type of bots.
if the CID team can figure it out, for a noob programmer like me, i will also feel good that they can achieve something that normally cant
on the other hand, i also feel sorry for them because most people can not provide any help to them. not only that, but people are just whining about "HURRY UP" "WHEN IS IT COMING OUT" "IT SHOULD BE EASY, COME ON" and thats very discouraging to them
(at least thats what i get from your idea that they are no good ASM programmer, and if they were it should be piece of cake that can be done in few hours. i know that might be a true fact, but they are trying their best, so i think they deserve no complaints. thats why i got a little bit mad)
at the end, if they can figure out, but decided not to release it in public
i will also support that idea
from the feedbacks, time consuming and lack of "good" ASM knowledge, thats what holding them back.
of course, deciding whether or not it is "wasting time" or "enjoying" for cracking the encryption is totally depend on them.