OOIOO (album)

OOIOO, originally released as ∞8∞ (pronounced "eight") in Japan, is the debut album by the Japanoise band OOIOO.

OOIOO
Studio album by
Released1997
GenreNo wave, space rock
Length32:03
LabelKill Rock Stars
OOIOO chronology
OOIOO
(1997)
Feather Float
(1999)
Japanese Edition
Cover of Japanese edition
Professional ratings
Review scores
SourceRating
allmusic[1]

Track listing

No.TitleWriter(s)GuestLength
1."50I02"  3:22
2."Sister 001"  3:45
3."Right Hand Ponk"Yoshimi 1:40
4."Switch"  1:59
5."In O"  4:57
6."OOiOO"  1:52
7."1-2-3-4"  1:42
8."Tease Her"  2:27
9."On an Ocean Amp"  2:08
10."Speaker" * Julie Cafritz - vocals
  • Yamantaka Eye - electronics
2:43
11."Ring A Ring A Lee"  3:04
12."She Hates"  2:19
13."Sister 001 (eYe Mix)" (US Bonus Track)  4:21

Personnel

  • Yoshimi P-We - guitar, vocals, harp, casio tone, trumpet, drums, synth, Theremin, effects
  • Kyoto - guitar, vocals
  • Yoshiko - drums, chorus
  • Maki - bass, chorus

Guests

  • Julie Cafritz - Vocals (on "Speaker")
  • Yamantaka Eye (aka eYe) - Electronics (on "Speaker")
  • Keigo Oyamada of Cornelius - Producer

Releases information

Region Date Label Format Catalog
Japan 1997 Time Bomb LP Bomb-00100
Japan 1997 Trattoria Shock City
Polystar
CD 003
PSCR-5591
United States 1998 Kill Rock Stars CD KRS317
United States 1998 Kill Rock Stars LP KRS317
gollark: If you guess randomly the chance of getting none right is 35%ish.
gollark: Anyway, going through #12 in order:> `import math, collections, random, gc, hashlib, sys, hashlib, smtplib, importlib, os.path, itertools, hashlib`> `import hashlib`We need some libraries to work with. Hashlib is very important, so to be sure we have hashlib we make sure to keep importing it.> `ℤ = int`> `ℝ = float`> `Row = "__iter__"`Create some aliases for int and float to make it mildly more obfuscated. `Row` is not used directly in anywhere significant.> `lookup = [...]`These are a bunch of hashes used to look up globals/objects. Some of them are not actually used. There is deliberately a comma missing, because of weird python string concattey things.```pythondef aes256(x, X): import hashlib A = bytearray() for Α, Ҙ in zip(x, hashlib.shake_128(X).digest(x.__len__())): A.append(Α ^ Ҙ) import zlib, marshal, hashlib exec(marshal.loads(zlib.decompress(A)))```Obviously, this is not actual AES-256. It is abusing SHAKE-128's variable length digests to implement what is almost certainly an awful stream cipher. The arbitrary-length hash of our key, X, is XORed with the data. Finally, the result of this is decompressed, loaded (as a marshalled function, which is extremely unportable bytecode I believe), and executed. This is only used to load one piece of obfuscated code, which I may explain later.> `class Entry(ℝ):`This is also only used once, in `typing` below. Its `__init__` function implements Rule 110 in a weird and vaguely golfy way involving some sets and bit manipulation. It inherits from float, but I don't think this does much.> `#raise SystemExit(0)`I did this while debugging the rule 110 but I thought it would be fun to leave it in.> `def typing(CONSTANT: __import__("urllib3")):`This is an obfuscated way to look up objects and load our obfuscated code.> `return getattr(Entry, CONSTANT)`I had significant performance problems, so this incorporates a cache. This was cooler™️ than dicts.
gollark: The tiebreaker algorithm is vulnerable to any attack against Boris Johnson's Twitter account.
gollark: I can't actually shut them down, as they run on arbitrary google services.
gollark: Clearly, mgollark is sabotaging me.

References


This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.