Quote:
Originally Posted by xyxepvp69
Everything is detectable and everything is bypassable .
|
Repeating yourself doesn't make it correct.
"Everything is bypassable", You're just digging your hole deeper.
Not everything "can be bypassed" (yes that is how you say it) and not everything is detectable.
You cannot tell me, that if I wrote an application that recompiled itself every 2-5 minutes, or relied on data obtained via a server application that I designed specifically for that app, to deliver encrypted data to be decrypted as obfuscated chunks, that it would be "detectable" or "bypassable".
And don't get me started on my custom Ghostware.
Just no. Stop trying to seem superior, it's not going to work when you have no idea what you are talking about bud.