• Destide@feddit.uk
      link
      fedilink
      English
      arrow-up
      33
      arrow-down
      1
      ·
      edit-2
      6 months ago

      Read the article? :D Doesn’t look like it’s live they just caught it in code

        • Destide@feddit.uk
          link
          fedilink
          English
          arrow-up
          36
          arrow-down
          1
          ·
          edit-2
          6 months ago

          That’s not how code of this magnitude works off the cuff GetPhysicallyInstalledSystemMemory() and GetPhysicalDiskSize()) aren’t defined and might exist in a file they couldn’t access. It’s also in C++ so you’d have to compile it first no one’s going through all that for a visual screenshot of a watermark at this stage

          • Valmond@lemmy.world
            link
            fedilink
            arrow-up
            4
            arrow-down
            2
            ·
            6 months ago

            Wow that’s some crappy C/C++ code, there’s even a goto 😁

            But whats the 0i64?

        • xan1242@lemmy.dbzer0.com
          link
          fedilink
          arrow-up
          7
          ·
          6 months ago

          They kinda don’t have the sources there. That’s a decompilation by IDA in that image.

          But nevertheless they could run it if they set up an arm64 machine, technically.

        • ඞmir@lemmy.ml
          link
          fedilink
          arrow-up
          2
          ·
          6 months ago

          If you want a serious answer, you could theoretically disable all security checks on Win11 so you could hex-edit patch it to run, but it would be (1) a lot of effort and (2) probably show that it’s nowhere near finished, because it still misses UI integration for example