BUT: Thinking in hall-of-mirrors style, this is too much fun. The code is right out there in good straightforward C++, and I can 'run' it by eyeball easily.
This smells like overripe low-hanging fruit.
If I wanted to write a source-obscurer for spooks, I wouldn't want the source code for the source-obscurer to be so nice and eyeballable. I'd want several levels of obscurity in the source code for the source-obscurer. The original would be written directly in hex opcodes for the CPU, and the original would never be on disk or paper. I'd write it in RAM, set it loose, then smash the RAM. I'm sure real spooks could take the obscurity a dozen levels deeper than I can.
Counterthought: It's certainly possible that CIA has grown sloppy and cocky after several decades of controlling everything via two forms of blackmail: monetary threats by bankers and threats of violence by Sharpton and Soros NGOs. When you feel absolutely protected, you tend to stop locking your doors. This angle feels less likely but could be true.Labels: Age of Stings
The current icon shows Polistra using a Personal Equation Machine.