This guy. This guy!
The protocol stands, but yet another implementation falls. Take this as a lesson.
Holy crap, it worked! (Of course, it was only logical that it would, but it always gives you a thrill to see that “I’m in!” moment…) And in only 10 minutes too! Out of the 4.2 million bytes in the file, there were only 53,442 unique contiguous 16 byte chunks, and our key was the 13,675th.
This is the future of hacking. Stay alert. Trust no one. Keep your JTAG interface handy.