this post was submitted on 05 Apr 2024
57 points (96.7% liked)

Explain Like I'm Five

14220 readers
3 users here now

Simplifying Complexity, One Answer at a Time!

Rules

  1. Be respectful and inclusive.
  2. No harassment, hate speech, or trolling.
  3. Engage in constructive discussions.
  4. Share relevant content.
  5. Follow guidelines and moderators' instructions.
  6. Use appropriate language and tone.
  7. Report violations.
  8. Foster a continuous learning environment.

founded 1 year ago
MODERATORS
 

Exemple: How does Apple guarantee that the iOS source code will not be discovered by an adversary?

Is there any type of different encryption for this case?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 6 points 7 months ago

For most of the code, I don't think anything special is used.

Compiling the code already obfuscates it enough. Most function, type and variable names are removed, the compiler does some optimizations and what you end up with is already pretty indecipherable code soup.

There are obfuscators that make the resulting binaries even harder to read/decompile, but further obfuscation also makes your code run slower.