Wow... I'm trying to pick apart how this works, but I'm getting lost in all the map transforms. Here's a few interesting notes that I've found so far... Warning: Spoilers!
There's some stuff that is unused... disinformation?
this bit of code is a fun transformation:
It takes an array or words, and returns an array of words. The first word of the returned array is composed of the first letters of the words in the input. the second words is composed of the second letters... and so on.
It is used here:
This re-orders the words output by the "_" function. 2,0,3,1,0,0,0,0,5 is the order. (Abuse of special variables here.)
Yet more abuse of special variables:
These variables are referenced below, and are set to various rot13 strings. One of which was created by the "_" function above.
One interesting side effect it the $\ variable. It puts an exclamation point and newline on the output record seperator, which I think puts it at the end of the output whenever this program is run.
I think this looks like a ROT13 mapping:
yes.. because it rot13's the following code:
Substitute in the special variables above, consolidate several cancatenations, and that would result in the array or strings to output.
Finally, that array is mapped to subroutines that output a given string, and placed in a hash:
of which one is then executed:
OMG. That's the first time I've ever de-obfuscated a program. :) ++vroom! Good obfuscation, nice presentation, and funny output for slashdot readers.