do {
re-sign decrypted binary (with Apple Developer account)
decrypt iOS app (from jailbroken device memory)
find resources of an app (on jailbroken device)
static Mach-O binary analyse
} catch _ {
11/10/2020
Amazon Kindle: iOS App Reverse Engineering for eBooks Leaking
04/10/2020
Alpina.Books: iOS App Forensics for eBooks Smuggling
27/09/2020
Back-port .fullScreenCover to SwiftUI 1.0
30/10/2019
[co-author] ProtonMail iOS client security
30/10/2019
[co-author] Security recommendation: enable FaceID or PIN protection on the ProtonMail iOS app
23/07/2019
Iterating over SwiftUI views delivered in a Swift Package
24/03/2018
24/7 Accelerometer Tracking with Apple Watch
16/03/2018
Using Raspberry Pi as an Apple TimeMachine
09/07/2017
Adaptive Design in iOS
15/03/2017
OWASP for iOS: M1 - Improper Platform usage, Part 2
29/01/2017
Unified Logging and Activity Tracing
24/12/2016
OWASP for iOS: M1 - Improper Platform usage, Part 1
04/05/2016
Swift, Perfect, mustache and PostgreSQL on Heroku - 4
03/05/2016
Swift, Perfect, mustache and PostgreSQL on Heroku - 3
01/05/2016
Swift, Perfect, mustache and PostgreSQL on Heroku - 2
30/04/2016
Swift, Perfect, mustache and PostgreSQL on Heroku
}