its ironic because you need a modem to download the 56k modem to begin with....a classic chicken and the egg problem!!!!
Oh, wow! I never noticed that!
Weird... Then again, I think if the chicken came first, it has much better chances, since wtf layed AND hatched the egg. It's like 2-1 ratio or whatever.
well in case anyone is wondering what the fuck (and i know you scrubs arent) is wrong with the algorithm:
the state of the current stream byte is 40 bits, but only 2^32 of those will correspond to the actual output byte...keeping in mind that the next generated byte uses two of the previous state bytes, you can mount a differential attack based on the elimination of the possible states of those 2 bytes based on the previous stream byte, and so on to the next byte and so on.
in the end i estimate you'd need around 2^50 work and a few kb of known plaintext to break it
another weakness is the key schedule, which doesn't do enough mixing and thus a related key attack is possible for very long keys
easiest fix: do feed-forward after mixing
better fix: fuck you grav!!