{"id":23,"date":"2005-01-14T07:54:11","date_gmt":"2005-01-14T14:54:11","guid":{"rendered":"\/?p=23"},"modified":"2006-02-20T17:25:15","modified_gmt":"2006-02-21T01:25:15","slug":"cribbed-microsoft-media-code","status":"publish","type":"post","link":"https:\/\/multimedia.cx\/eggs\/cribbed-microsoft-media-code\/","title":{"rendered":"Cribbed Microsoft Media Code"},"content":{"rendered":"<p>Okay folks, let&#8217;s get a few things clear here: Yes, we all know that some official source code for a few of Microsoft&#8217;s A\/V codecs made it into the wrong hands and is now floating around the internet. Understand that you are <strong>not<\/strong> l33t h4X0r if you happen to receive this file. Also, <strong>quit sending it to me<\/strong>. I do not want it. I delete it upon receipt. I may have to implement a special mail filter to deal with it.<\/p>\n<p>Realize that this could taint us. I have no problem with ripping open a publically-available binary decoder to discover an algorithm inside (and if they happen to leave the debug symbols compiled in, oops, file that under <em>&#8220;their problem&#8221;<\/em> category).<\/p>\n<p>If it makes you feel any better, there are some people who have already glanced at the code and discovered that it covers algorithms that <strong>we have already largely reverse engineered<\/strong>, a long time ago, via legitimate methods.<\/p>\n<p>Microsoft should come up with bogus, red herring source code samples and periodically &#8220;leak&#8221; them, just to give the <em>-ahem-<\/em> &#8220;hacker underground&#8221; something to salivate over and feel special about.<\/p>\n<p>&#8230;sigh&#8230; and I had really hoped to avoid creating a legal\/ethical category for this blog&#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DO NOT send me the stolen Microsoft codec code&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,4],"tags":[],"class_list":["post-23","post","type-post","status-publish","format-standard","hentry","category-legalethical","category-reverse-engineering"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/posts\/23","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/comments?post=23"}],"version-history":[{"count":0,"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/posts\/23\/revisions"}],"wp:attachment":[{"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/media?parent=23"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/categories?post=23"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/multimedia.cx\/eggs\/wp-json\/wp\/v2\/tags?post=23"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}