I can't believe that there were not more reverse engineering comments considering the number of years since your talk. Life has gotten much more complicated and being able to figure some other's approach and perhaps improve it is very important. Yes, we need better automatic collaborative tools. Nice effort and talk!
@TonyMach0112 жыл бұрын
A geek with a sense of humor. Dear lord indeed.
@nostalgeek28722 жыл бұрын
Hello everyone ! Beginner user of our favorite software Wireshark to analyze USB communications, for practical reasons I would like to know how to save the "payload" in the capture file, excluding the USB protocol layers (tokens, PID, handshake ... among other packaging data). I'm using Linux Mint and my skills about programming ang compilating are very very poor. Thanks for your help.
@UseLogicPlease12312 жыл бұрын
Sounds nice.... but what happens when your dealing with encrypted data streams? As speeds of buses and processors increase, the overhead of data encryption becomes negligible and it prevents people from reverse engineering your drivers and selling equivalent products. I fear this approach only works in certain cases. Very nice video though. Would be nice to hear some more lectures about USB basics.
@chrisw14623 жыл бұрын
Thanks for posting the video in a resolution that makes reading the data on some screens impossible.
@gayusschwulius84903 жыл бұрын
You only have to click the link in the subscription to get a higher resolution. Back in 2011, more than 480p wasn't possible with KZbin.
@norbertmakula43565 жыл бұрын
I need that jumper
@TehAnyKey13 жыл бұрын
Great talk!
@BracedPoleCat13 жыл бұрын
*reads hoodie* apeture science... dear lord
@717Fang4 жыл бұрын
Openvizla is already works 10 years on this project. its shame!