this post was submitted on 05 Apr 2024
58 points (96.8% liked)

Explain Like I'm Five

14243 readers
28 users here now

Simplifying Complexity, One Answer at a Time!

Rules

  1. Be respectful and inclusive.
  2. No harassment, hate speech, or trolling.
  3. Engage in constructive discussions.
  4. Share relevant content.
  5. Follow guidelines and moderators' instructions.
  6. Use appropriate language and tone.
  7. Report violations.
  8. Foster a continuous learning environment.

founded 1 year ago
MODERATORS
 

Exemple: How does Apple guarantee that the iOS source code will not be discovered by an adversary?

Is there any type of different encryption for this case?

you are viewing a single comment's thread
view the rest of the comments
[–] Oisteink@feddit.nl 1 points 7 months ago (1 children)

They use a lock on the door to where it’s stored.

This mechanism blocks people from discovering their source code.

Also the source is split into subsystems - very few at apple will have access to the full iOS code base at any time

[–] Munkisquisher@lemmy.nz 1 points 7 months ago (1 children)

Kinda true, some places develop on machines that don't have Internet access, air gap between the sensitive data and an outward facing network

[–] towerful@programming.dev 1 points 7 months ago

FML, copying from stackoverflow on your phone to an airgapped terminal would be a massive PITA