Even a “FBFeedAwesomeizer” - which alone is a collection of 74 classes and protocols.
This is why the application binary itself is over 114Mb.
on reverse engineering of the facebook application for ios.
http://quellish.tumblr.com/post/126712999812/how-on-earth-the-facebook-ios-application-is-so
#facebook #ios #application #reverse_engineering #programming
some armenian from LA prepared this curves reverse engineering method:
https://www.youtube.com/watch?v=V-DPJ-UuguQ
#photoshop #gimp #curves #graphics #reverse_engineering
gimp instagram effects http://registry.gimp.org/node/28613
#gimp #instagram #reverse_engineering #flter #graphics #image
By analysing signalling messages exchanged during a WhatsApp call using an Android device, the researchers were able to closely examine the authentication process of WhatsApp clients; discover what codec WhatsApp is using for voice media streams (Opus at 8 or 16 kHz sampling rates); understand how relay servers are announced and the relay election mechanism; and understand how clients announce their endpoint addresses for media streams.
A paper about the study, entitled WhatsApp Network Forensics: Decrypting and Understanding WhatsApp Call Signaling Messages, was published in the scholarly journal Digital Investigation. The article was co-authored by F. Karpisek of Brno University of Technology in the Czech Republic, and Ibrahim Baggili and Frank Breitinger, co-directors of the Cyber Forensics Research & Education Group at the University of New Haven.
http://www.theregister.co.uk/2015/10/27/whatsapp_forensic_analysis/
via John van Gils.
#whatsapp #android #research #opus #reverse_engineering #forensic
very interesting resource for those who are interested in compilers: http://turbopascal.org/turbo-pascal-internals
#internals #compiler #source #code #programming #compilers #pascal #turbo_pascal #book #analysis #reverse_engineering #research