• Destide
    link
    fedilink
    English
    arrow-up
    33
    arrow-down
    1
    ·
    edit-2
    8 months ago

    Read the article? :D Doesn’t look like it’s live they just caught it in code

      • Destide
        link
        fedilink
        English
        arrow-up
        36
        arrow-down
        1
        ·
        edit-2
        8 months ago

        That’s not how code of this magnitude works off the cuff GetPhysicallyInstalledSystemMemory() and GetPhysicalDiskSize()) aren’t defined and might exist in a file they couldn’t access. It’s also in C++ so you’d have to compile it first no one’s going through all that for a visual screenshot of a watermark at this stage

        • Valmond@lemmy.world
          link
          fedilink
          arrow-up
          4
          arrow-down
          2
          ·
          8 months ago

          Wow that’s some crappy C/C++ code, there’s even a goto 😁

          But whats the 0i64?

      • xan1242@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        7
        ·
        8 months ago

        They kinda don’t have the sources there. That’s a decompilation by IDA in that image.

        But nevertheless they could run it if they set up an arm64 machine, technically.

      • ඞmir@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        8 months ago

        If you want a serious answer, you could theoretically disable all security checks on Win11 so you could hex-edit patch it to run, but it would be (1) a lot of effort and (2) probably show that it’s nowhere near finished, because it still misses UI integration for example