• @aax@lemmy.world
    link
    fedilink
    English
    38 months ago

    It’s clear you don’t have a great understanding of how this works. You don’t have to break cryptography. You simply need to extract the cryptographic keys from the device and then reverse the algorithm it uses to create the sig of the photos.

    • LUHG
      link
      fedilink
      English
      -38 months ago

      Simply. Mate, what are you smoking?