Comment by sovande
10 years ago
This so called "investigation" of the Facebook app can be done much simpler. Locate the app in iTunes, rename the .ipa file to .zip, unzip and run otool and nm on the binary. The author list 18,000 header files which is not much of an investigation nor much interesting. Though the staggering number of classes does admittingly somewhat explain the enormous size of the FB app. I do not use the FB app, but generally it can be equally illuminating to look in the Resources/ folder of an app if you wonder where the size came from.
No. You have to jailbreak and "crack" the app to get at the code segment, which makes this more of an effort than you make it out to be. Unless you know something I don't?
The symbols themselves are not encrypted, so you can still list those without cracking the app.
He didn't claim it to be an investigation. It seems to be an insight.
As for being interesting, it's quite subjective. Might not be interesting to you, but it makes other people wonder.
class-dump[0] is handy too.
>This is the same information provided by using ‘otool -ov’, but presented as normal Objective-C declarations, so it is much more compact and readable.
[0] https://github.com/nygard/class-dump