Graham Smith
Graham Smith
I had the same issue. Fixed by changing the following line of code in scraping.py: ``` python def before_search(self): """Things that need to happen before entering the search loop.""" #...
I'm working on a solution for this. Chances are stem use will be limited. It's much easier to spawn a ton of Tor instances with different ports and connect through...
Perhaps we could setup [go-fuzz](https://github.com/dvyukov/go-fuzz) instead? It wouldn't be a bad idea to keep an active count of CPU hours spent fuzzing. I hear it's pretty good at finding bugs
For now, perhaps it is best to simply reference the C structs as generated by cgo like in crypto_generichash.go
My method uses Apple's notification system. I realized that even after logging out, notifications continue. I have plans to reverse-engineer this connection to Apple's push servers, although it won't be...
I'm working on reversing it. It's a pain because iOS notifications won't route through a proxy specified in network settings and they are certificate pinning. This could work well for...
This is evidence that the background requests don't rely on auth_tokens, which could also serve as a vulnerability.
Great work! I was actually planning on doing this with the unit tests, but high school :(
I'm not sure of the condition of this repo, so I'd suggest using https://godoc.org/golang.org/x/crypto/nacl for now.
I think he was waiting on me to add unit tests but I never got around to it :/