We plan to open source the entire project at some point. For now, parts have been open sourced.

We also have technical documentation of the exploits used.

Finally, we challenge worthy hackers to reverse the rest of the exploit. We open-source each component as soon as it has been reversed.