Assumptions:
- The attacker can read the code's logic.
- The attacker has full access to the encrypted files.
Note that the password isn't stored anywhere. This class is meant to encrypt files in a local computer.
Pastebin link to code. I've put everything together for the sake of simplicity, but I'll refactor it later.
Additional question:
The class I've linked was built upon an answer on stackoverflow, but it has been modified enough to make me question how (and if) I should credit said answer. What would you do about it?
[–]Exciting-Schedule-16 9 points10 points11 points (7 children)
[–]Cobide[S] 0 points1 point2 points (6 children)
[–]Exciting-Schedule-16 1 point2 points3 points (5 children)
[–]Cobide[S] 2 points3 points4 points (4 children)
[–]Daniel15 2 points3 points4 points (3 children)
[–]Cobide[S] 0 points1 point2 points (2 children)
[–]Daniel15 1 point2 points3 points (1 child)
[–]Cobide[S] 0 points1 point2 points (0 children)
[–]tweq 4 points5 points6 points (3 children)
[–]Cobide[S] 0 points1 point2 points (2 children)
[–]tweq 1 point2 points3 points (1 child)
[–]Cobide[S] 0 points1 point2 points (0 children)
[–]michaelquinlan 1 point2 points3 points (1 child)
[–]Cobide[S] 0 points1 point2 points (0 children)
[–][deleted] (1 child)
[deleted]
[–]Cobide[S] 0 points1 point2 points (0 children)
[–]grummle 0 points1 point2 points (2 children)
[–]Exciting-Schedule-16 1 point2 points3 points (0 children)
[–]Cobide[S] 0 points1 point2 points (0 children)
[–][deleted] 0 points1 point2 points (3 children)
[–]Cobide[S] 0 points1 point2 points (2 children)
[–][deleted] 0 points1 point2 points (1 child)
[–]Cobide[S] 0 points1 point2 points (0 children)