Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If that becomes a problem and they get enough funding, I'm sure they can spend a few days / weeks reverse engineering the functions they need. At this point it just needs some effort, not some crazy research capabilities.


Given that these are cryptography-related functions, I feel like symbolic execution could yield the actual algorithm they use.


It's probably not even that hard. If some block looks like a crypto section, you can likely match the relevant constants to the algorithm. It's not like Apple will use some super custom solution there. "Where is the AES and how is the IV generated" is more likely question.


It’s already in the works, someone has already made a lot of progress on this front on pypush’ Discord server.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: