aax

joined 1 year ago
[–] aax@lemmy.world 2 points 1 year ago (1 children)

It’s clear you don’t have a great understanding of how this works. You don’t have to break cryptography. You simply need to extract the cryptographic keys from the device and then reverse the algorithm it uses to create the sig of the photos.

[–] aax@lemmy.world 9 points 1 year ago (4 children)

It literally is a lock waiting to get picked. The keys have to be somewhere on the device to create the signature of the photo. This can be reverse engineered, although it may not be trivial.