Hacker News new | past | comments | ask | show | jobs | submit login

Are you familiar with how Ghidra works? You run it own your own computer on a binary that you feed it. It’s not like it talks to the NSA to exfiltrate things.



He's not completely wrong though, you do want to be careful when your using something developed by someone like the NSA. It's the same reason you want to be careful using cracked versions of IDA since the guys that can crack IDA can probably do other stuff to it.

I think thats part of the reason NSA open sourced the code for it so people could see no backdoor are in there. So in this particular case maybe less of a concern


The NSA would suffer reputational damage by doing this. Random cracker might do so too but it’s definitely a different market.


That's the point. If you suspected anything then the tool wouldn't be useful, not too dissimilar to the Underhanded C contest [0].

[0] http://www.underhanded-c.org/




Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: