Answer the question
In order to leave comments, you need to log in
How to disassemble ipa into parts and find out how it works?
How to disassemble ipa into parts and find out how it works?
There are two applications that make calls through some kind of tricky protocol.
You need to use them inside a certain office, but you need to find out if the encryption scheme is acceptable (point-to-point) or not (the data goes through a third-party server).
How to do it?
Answer the question
In order to leave comments, you need to log in
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question