@@ -2136,9 +2136,6 @@ GoogleUtilities
2136
2136
2137
2137
================================================================================
2138
2138
2139
- The following copyright from Landon J. Fuller applies to the isAppEncrypted
2140
- function in Environment/third_party/GULAppEnvironmentUtil.m.
2141
-
2142
2139
Copyright (c) 2017 Landon J. Fuller <
[email protected] >
2143
2140
All rights reserved.
2144
2141
@@ -2159,26 +2156,6 @@ COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
2159
2156
IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
2160
2157
CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
2161
2158
2162
- Comment from
2163
- <a href="http://iphonedevwiki.net/index.php/Crack_prevention">iPhone Dev Wiki
2164
- Crack Prevention</a>: App Store binaries are signed by both their developer
2165
- and Apple. This encrypts the binary so that decryption keys are needed in order
2166
- to make the binary readable. When iOS executes the binary, the decryption keys
2167
- are used to decrypt the binary into a readable state where it is then loaded
2168
- into memory and executed. iOS can tell the encryption status of a binary via the
2169
- cryptid structure member of LC_ENCRYPTION_INFO MachO load command. If cryptid is
2170
- a non-zero value then the binary is encrypted.
2171
-
2172
- 'Cracking' works by letting the kernel decrypt the binary then siphoning the
2173
- decrypted data into a new binary file, resigning, and repackaging. This will
2174
- only work on jailbroken devices as codesignature validation has been removed.
2175
- Resigning takes place because while the codesignature doesn't have to be valid
2176
- thanks to the jailbreak, it does have to be in place unless you have AppSync or
2177
- similar to disable codesignature checks.
2178
-
2179
- More information at <a href="http://landonf.org/2009/02/index.html">Landon
2180
- Fuller's blog</a>
2181
-
2182
2159
2183
2160
SwiftProtobuf
2184
2161
Apache License
0 commit comments