Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It tries to decrypt the random data using the corpus built on the original data.

so the end of the file looks like:

"Hesn’ed a tembers, ea ' mo byarrledMaelcallrlynwigr oysTold yo joinnt bnan twas The spwt?" aaoWe sastleenkeep had thein; aimaf it oneivof sv TheeTssuterrcy oid,itng the shuri us d it m, ed iroduone dga go toe s, mooerhae�er "aot ofSsallR:58:40, in the darkn,erqwader t. "Whsne�ee thit wasaidfrenthct,nnto erut be�sRhe Hiesented onvery h Tsh thrs, at d tkly he on upnbadarkn,eJls tat.iwheitu rs p.you ue, nC could seunnip on Lo of its e put his p," theden, b��t te�ee thln’t tcept ofuicideBge fnoh me,sh yod aw to awyarrleomo. rare Hutofases vred ve s"s. "Hicsuty sely’s lher uri and watcosThe yfiile.cn, aub, baelcumsemit wChcycleis the ��d taJ hair b"



wow that's cool thanks




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: