Comment by naruhodo

1 month ago

I would love to evaluate the privacy of these technologies.

Someone reply with a link to the source code so I can see exactly what it is doing, without having to take an internet rando's word for it.

Better yet, let me compile it myself.

If you have the capability to actually skillfully analyze this type of crypto, disassembling the binaries from your device (or at the very least, an ipsw for your device) should be trivial.

After all, you wouldn’t actually be trusting the source code given to you to match what’s running on your device, would you?

  • Reverse engineering is a separate skillet on its own, on top of the other ones you need to read the source code and good developers aren't necessarily good at that.

    > After all, you wouldn’t actually be trusting the source code given to you to match what’s running on your device, would you?

    That's why the best practice in the industry follows reproducible builds.

You had better build your own silicon chips and phone hardware as well in that case.