this post was submitted on 05 Apr 2024
58 points (96.8% liked)

Explain Like I'm Five

14220 readers
4 users here now

Simplifying Complexity, One Answer at a Time!

Rules

  1. Be respectful and inclusive.
  2. No harassment, hate speech, or trolling.
  3. Engage in constructive discussions.
  4. Share relevant content.
  5. Follow guidelines and moderators' instructions.
  6. Use appropriate language and tone.
  7. Report violations.
  8. Foster a continuous learning environment.

founded 1 year ago
MODERATORS
 

Exemple: How does Apple guarantee that the iOS source code will not be discovered by an adversary?

Is there any type of different encryption for this case?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 9 points 7 months ago

Turning code usable by machines into anything remotely readable is really hard. Hard enough that the people doing it are either doing it as a hobby, meaning the output quality isn't a concern, or there has to be massive amounts of potential profit. For something like iOS the second isn't ever going to be the case because competitors outright can't really use the source code if they did get it, that's protected by copyright or something. On the hobby side however, code decompilation is a thing that happens from time to time.

TLDR: the difficulty is in making the source code readable, not in getting the source code.