Login Register






Thread Rating:
  • 0 Vote(s) - 0 Average


Objective-C/iOS reverse engineering for hidden features filter_list
Author
Message
RE: Objective-C/iOS reverse engineering for hidden features #4
(03-03-2018, 02:47 PM)phyrrus9 Wrote:
(03-03-2018, 06:06 AM)mothered Wrote: The underlying encryption seems like an overkill, but very Impressive I might add.

The article Is quite detailed, so (as time permits) I'll go through It later today or early tomorrow.

You'd think so, but all of it was added by simple necessity. These levels of encryption are what prevents the government (and Apple) from reading your data, even with physical access or by using a cloud backup. Not even apple has the user or system keys.

I certainly agree with you here. Although I mentioned of an overkill, It wasn't Implied In a negative manner.

I always operate In a complex environment, and an overkill Is part of that equation. For example, I have all USB sticks, external HDDs encrypted with BitLocker. In that, sits an encrypted volume created with VeraCrypt. Inside the VeraCrypt encrypted volume sits "another" encrypted volume, again via VeraCrypt. Ultimately, there's 3 levels of encryption (and the same amount of authentication) to access my data.

Good luck to anyone attempting to grab my files.
[Image: AD83g1A.png]

Reply





Messages In This Thread
RE: Objective-C/iOS reverse engineering for hidden features - by mothered - 03-04-2018, 02:50 AM



Users browsing this thread: 1 Guest(s)