Exemple: How does Apple guarantee that the iOS source code will not be discovered by an adversary?

Is there any type of different encryption for this case?

  • @[email protected]
    link
    fedilink
    English
    19 months ago

    They use a lock on the door to where it’s stored.

    This mechanism blocks people from discovering their source code.

    Also the source is split into subsystems - very few at apple will have access to the full iOS code base at any time

    • @[email protected]
      link
      fedilink
      English
      19 months ago

      Kinda true, some places develop on machines that don’t have Internet access, air gap between the sensitive data and an outward facing network

      • @[email protected]
        link
        fedilink
        English
        19 months ago

        FML, copying from stackoverflow on your phone to an airgapped terminal would be a massive PITA