Objective-C/iOS reverse engineering for hidden features 03-03-2018, 05:29 AM
#1
So, I stumbled across an article while I was about to fall asleep about digging for hidden features while doing some iOS app reverse engineering (on app store apps). This article is specifically about the very recent discovery of Instagram's (not yet even announced) video calling feature. I advise people check it out, it sheds a lot of light on how some of the hackery goes on. Note, these Cycript hacks are really useful when probing for new jailbreak stuff as well. Of course, you need a jailbreak to use it, but many of us have our own private jailbreaks that we use for our own development and don't want to burn (these holes tend to remain open for years at a time), and so we often use these jailbreaks and some code injection to find potential new jailbreaks.
Please do read the article though, it's at the very least an interesting look into the enigma of iOS, and especially the cryptography behind it....for your reference, here's how secure it is:
The entire disk is encrypted with a system key
under that, each partition is encrypted with its own key
under that, the user data directory is encrypted with the user key
each application is cryptographically signed with the developer's key
the developer's key is signed with Apple's CA key
the application binary is encrypted to prevent exactly this from going on
the application's memory is encrypted to prevent things like the intel bugs from being useful.
these features are what makes iOS the most secure operating system in the modern era, among others.
Link: https://medium.com/@guilhermerambo/how-i...4d7085da57
Please do read the article though, it's at the very least an interesting look into the enigma of iOS, and especially the cryptography behind it....for your reference, here's how secure it is:
The entire disk is encrypted with a system key
under that, each partition is encrypted with its own key
under that, the user data directory is encrypted with the user key
each application is cryptographically signed with the developer's key
the developer's key is signed with Apple's CA key
the application binary is encrypted to prevent exactly this from going on
the application's memory is encrypted to prevent things like the intel bugs from being useful.
these features are what makes iOS the most secure operating system in the modern era, among others.
Link: https://medium.com/@guilhermerambo/how-i...4d7085da57