Inane Observations $ sudo fix_it
  • Investigating a proprietary Android 2FA system

    02 December 2024 | android reverse engineering obfuscation security programming java | Comment

    This article concerns an Android app used as part of a proprietary two-factor authentication (2FA) system. Investigation of the app and 2FA protocol reveals some interesting design decisions.

    Overview

    The 2FA system is similar to well-known offerings such as Duo Security and Okta Verify.… »

  • Investigating a historical Android anti-root protection system

    24 November 2024 | android reverse engineering obfuscation security programming java | Comment

    This article concerns a specialised Android app used as part of a proprietary authentication protocol, developed in the late 2010s. Given the intended use case, the app features a number of aggressive security measures – the app uses FLAG_SECURE and does not run when developer… »

  • Investigating a proprietary early-2000s abandonware ebook format

    11 June 2024 (updated 11 June 2024) | copyright drm reverse engineering obfuscation security | Comment

    This article concerns a Windows software product which featured the ability to compile HTML websites and multimedia content into a standalone EXE file. The last release of this product was in 2003, and the product website has ceased to operate from 2012. Content was stored… »

  • Reverse engineering software licensing from early-2000s abandonware – Part 3

    29 August 2021 (updated 31 August 2021) | copyright drm reverse engineering obfuscation security | Comment

    In part 2, we reverse engineered the decrypted format of the licence file data for this particular software. In this part, we investigate that how exactly that licence file is encrypted.

    Into the fray

    In part 2, we identified that the decrypted licence file… »

  • Reverse engineering software licensing from early-2000s abandonware – Part 2

    29 August 2021 (updated 31 August 2021) | copyright drm reverse engineering obfuscation security | Comment

    In part 1, we reverse engineered the registration code licensing mechanism of this particular software. However, that mechanism was not the mechanism actually in use in 2004; rather, a different mechanism was used based on licence files named license.bin. In this part, we… »

  • Reverse engineering software licensing from early-2000s abandonware – Part 1

    29 August 2021 (updated 31 August 2021) | copyright drm reverse engineering obfuscation security | Comment

    Background

    This series concerns a software licensing system used in a proprietary software application from circa 2004. The software was available in an unregistered trial mode with limited functionality. A free licence could be obtained by registering online with the software vendor. The software became… »

  • Investigating and disabling hard-coded certificate pinning in an Android application

    23 December 2020 | programming reverse engineering obfuscation security cryptography encryption | Comment

    mitmproxy is an open source interactive HTTPS proxy, which makes it easy to intercept HTTPS for reverse engineering, including an Android clients. It does this by installing its own CA certificate on the client device.1

    Recently, I was attempting to reverse engineer the HTTPS… »

  • Illegal numbers

    30 December 2019 | copyright drm reverse engineering obfuscation security law | Comment

    Legal counsel for various companies, including AACS LA (Advanced Access Content System Licensing Administrator) LLC, DVD Copy Control Association Incorporated, Intel Corporation, Motion Picture Association of America Incorporated, Sony Computer Entertainment America Incorporated and Texas Instruments Incorporated, have determined that the possession or distribution of… »

  • Investigating Google Cast: Disabling device authentication on Android with Xposed

    20 December 2019 (updated 22 December 2019) | reverse engineering obfuscation security google cast | Comment

    Background

    Google Cast is a proprietary protocol by Google which enables controlling playback of Internet-streamed audiovisual content on the Chromecast, Android TV and other compatible devices.

    From the consumer perspective, Google Cast connects two devices: a sender (such as a smartphone) and a receiver (such… »

  • Investigating a MIDI music DRM system (c. 1998)

    24 August 2019 (updated 28 August 2019) | copyright drm reverse engineering obfuscation security | Comment

    Background

    This post concerns a DRM system used in a proprietary JavaScript-based music player. The music is sequenced locally in the client based on instrument and note data, à la MIDI. The music player does not have any export capabilities, but like the previous instalment… »

  • Investigating a legacy document delivery DRM system – Part 2

    17 August 2019 | copyright drm reverse engineering obfuscation security | Comment

    Last time, we investigated the HTML5 viewer for a document delivery DRM system, rehosting the viewer to give us unlimited access to documents – but only through the standard print procedure, which inserts watermarks and copyright information. This time, we'll investigate how we can… »

  • Investigating a legacy document delivery DRM system – Part 1

    17 August 2019 | copyright drm reverse engineering obfuscation security | Comment

    Background

    This post concerns a DRM system used in an online document delivery platform (think PDFs, but proprietary), established circa 2000 and still in popular operation. Documents purchased through the platform are delivered in a proprietary encrypted file format, which can be opened using a… »

  • Home
  • Git (Archives: GitLab, GitHub)
  • Research
  • Music
  • Posts
    • May 2025 (3)
    • December 2024 (2)
    • November 2024 (2)
    • September 2024 (2)
    • August 2024 (1)
    • More…
  • Tags
    • medicine (25)
    • copyright (20)
    • opentally (20)
    • drm (19)
    • encryption (12)
    • monash (12)
    • mathematics (11)
    • statistics (10)
    • proportional representation (8)
    • python (8)
    • victoria (8)
    • law (7)
    • meeting procedure (7)
    • ptv (7)
    • public transport (7)
    • rust (7)
    • defective by design (6)
    • digital rights management (6)
    • creative commons (4)
    • webassembly (4)
    • metro trains (3)
    • paediatrics (3)
    • politics (3)
    • 2fa (2)
    • c (2)
    • graphics (2)
    • mfa (2)
    • pdf (2)
    • victorian electoral commission (2)
    • android (5)
    • security (18)
    • cryptography (12)
    • programming (12)
    • voting systems (8)
    • med in review (11)
    • music (10)
    • parliamentary procedure (7)
    • totp (2)
    • reverse engineering (20)
    • obfuscation (12)
    • single transferable vote (19)
    • ebook (16)
    • elections (12)
    • java (6)
    • linux (33)
  • Lee Yingtong Li
  • blog@yingtongli.me
  • My CV · CV of Failures
@RunasSudo

Most material on this website is available under an open licence. See https://yingtongli.me/blog/copyright.html for details.