• @GamingChairModel
    link
    English
    226 months ago

    Is there a legitimate reason for it not being reverse-engineered yet?

    The actual protocol isn’t a secret. It’s that the authentication of the device relies on a hardware key, and that key is fully locked down by Apple (as it also secures the user’s biometric logins, keyring, financial information in Apple Wallet, etc.).

    • @scarilog
      link
      English
      16 months ago

      If it relies on a hardware key then why is it that I can get the same setup working with a macos virtual machine?

      Using [BlueBubbles] (https://bluebubbles.app/) for anyone wondering.