Exemple: How does Apple guarantee that the iOS source code will not be discovered by an adversary?

Is there any type of different encryption for this case?

  • shalafi@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    3 months ago

    People here talking about decompiling code. Maybe you meant to ask how they’re certain it’s not stolen from home base?

    All our goods are hidden behind a VPN or MFA (multi-factor authentication). Unless someone does something stupid, you’re not getting in our BitBucket or AWS account.