If you figure out a way to tell me the plaintext for this encrypted file, send the plaintext (or some part of it) to <name of encryption program> at <my username>.de and I'll give you 1000€.
Only first person to send it to me gets the bounty.
| // ==UserScript== | |
| // @name TUDa Informatik Moodle Auto-Login Redirect | |
| // @namespace https://moodle.informatik.tu-darmstadt.de/ | |
| // @version 2025-10-16 | |
| // @description Automatically redirect to login when logged out | |
| // @author frereit | |
| // @match https://moodle.informatik.tu-darmstadt.de/ | |
| // @icon https://www.google.com/s2/favicons?sz=64&domain=tu-darmstadt.de | |
| // @grant none | |
| // ==/UserScript== | 
If you figure out a way to tell me the plaintext for this encrypted file, send the plaintext (or some part of it) to <name of encryption program> at <my username>.de and I'll give you 1000€.
Only first person to send it to me gets the bounty.
This is an implementation of AES-GCM and an attack on it that can be used to fully break the cipher on nonce reuse. I wanted to use it for a blog entry but it is about 10x faster to do in Web Assembly, so that's what I'm doing.
I'm putting it up here in case it's interesting to anybody and I'll add a link to the blog entry once it's finished.
Edit: Late but the blog post is at