The Second Mate
The Second Mate is a 1950 British crime film directed by John Baxter and starring Gordon Harker, Graham Moffatt and David Hannaford.[1] It was made at Southall Studios.
The Second Mate | |
---|---|
Directed by | John Baxter |
Produced by | John Baxter Barbara K. Emary |
Written by | Anson Dyer Barbara K. Emary Jack Francis Geoffrey Orme |
Starring | Gordon Harker Graham Moffatt |
Music by | Kennedy Russell |
Cinematography | Arthur Grant |
Edited by | Vi Burdon |
Production company | Elstree Independent Films |
Distributed by | Associated British-Pathé |
Release date | 1950 |
Running time | 76 minutes |
Country | United Kingdom |
Language | English |
Cast
- Gordon Harker as Bill Tomkins
- Graham Moffatt as Paddy
- David Hannaford as Bobby
- Beryl Walkeley as Kate
- Charles Sewell as Joe
- Anne Blake as Fortune Teller
- Charles Heslop as Hogan
- Jane Welsh as Mrs. Mead
- Howard Douglas as Dusty
- Pauline Drewett as Pauline
- Tom Fallon as Police Officer
- Hamilton Keene as Bishop
- Pat Keogh as Spike
- Sam Kydd as Wheeler
- Johnnie Schofield
gollark: Anyway, going through #12 in order:> `import math, collections, random, gc, hashlib, sys, hashlib, smtplib, importlib, os.path, itertools, hashlib`> `import hashlib`We need some libraries to work with. Hashlib is very important, so to be sure we have hashlib we make sure to keep importing it.> `ℤ = int`> `ℝ = float`> `Row = "__iter__"`Create some aliases for int and float to make it mildly more obfuscated. `Row` is not used directly in anywhere significant.> `lookup = [...]`These are a bunch of hashes used to look up globals/objects. Some of them are not actually used. There is deliberately a comma missing, because of weird python string concattey things.```pythondef aes256(x, X): import hashlib A = bytearray() for Α, Ҙ in zip(x, hashlib.shake_128(X).digest(x.__len__())): A.append(Α ^ Ҙ) import zlib, marshal, hashlib exec(marshal.loads(zlib.decompress(A)))```Obviously, this is not actual AES-256. It is abusing SHAKE-128's variable length digests to implement what is almost certainly an awful stream cipher. The arbitrary-length hash of our key, X, is XORed with the data. Finally, the result of this is decompressed, loaded (as a marshalled function, which is extremely unportable bytecode I believe), and executed. This is only used to load one piece of obfuscated code, which I may explain later.> `class Entry(ℝ):`This is also only used once, in `typing` below. Its `__init__` function implements Rule 110 in a weird and vaguely golfy way involving some sets and bit manipulation. It inherits from float, but I don't think this does much.> `#raise SystemExit(0)`I did this while debugging the rule 110 but I thought it would be fun to leave it in.> `def typing(CONSTANT: __import__("urllib3")):`This is an obfuscated way to look up objects and load our obfuscated code.> `return getattr(Entry, CONSTANT)`I had significant performance problems, so this incorporates a cache. This was cooler™️ than dicts.
gollark: The tiebreaker algorithm is vulnerable to any attack against Boris Johnson's Twitter account.
gollark: I can't actually shut them down, as they run on arbitrary google services.
gollark: Clearly, mgollark is sabotaging me.
gollark: I submitted them but they were all wrong.
References
External links
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.