diff --git a/CoreOnly/NOTICES b/CoreOnly/NOTICES index 65d76947893..583580833cc 100644 --- a/CoreOnly/NOTICES +++ b/CoreOnly/NOTICES @@ -2136,9 +2136,6 @@ GoogleUtilities ================================================================================ -The following copyright from Landon J. Fuller applies to the isAppEncrypted -function in Environment/third_party/GULAppEnvironmentUtil.m. - Copyright (c) 2017 Landon J. Fuller All rights reserved. @@ -2159,26 +2156,6 @@ COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. -Comment from -iPhone Dev Wiki -Crack Prevention: App Store binaries are signed by both their developer -and Apple. This encrypts the binary so that decryption keys are needed in order -to make the binary readable. When iOS executes the binary, the decryption keys -are used to decrypt the binary into a readable state where it is then loaded -into memory and executed. iOS can tell the encryption status of a binary via the -cryptid structure member of LC_ENCRYPTION_INFO MachO load command. If cryptid is -a non-zero value then the binary is encrypted. - -'Cracking' works by letting the kernel decrypt the binary then siphoning the -decrypted data into a new binary file, resigning, and repackaging. This will -only work on jailbroken devices as codesignature validation has been removed. -Resigning takes place because while the codesignature doesn't have to be valid -thanks to the jailbreak, it does have to be in place unless you have AppSync or -similar to disable codesignature checks. - -More information at Landon -Fuller's blog - SwiftProtobuf Apache License