Exemple: How does Apple guarantee that the iOS source code will not be discovered by an adversary?

Is there any type of different encryption for this case?

  • Shadow@lemmy.ca
    link
    fedilink
    English
    arrow-up
    23
    arrow-down
    2
    ·
    3 months ago

    The source code isn’t raw on the device in its normal human editable format. It’s compiled from easy to read code into binary machine code, it generally can’t be easily decompiled.