Hi, i've an app,readr by pixelmags @hxxp://www.readrapp.com/
well known to read magazines,you probably know it with all the flex tweaks and complaints about the anytime hacks but after research i can't find how to reverse and find the encryption used?! all downloaded magz are encrypted with aes256,a key with 1 hex char for each mag,the magz can be read offline,i conclude that the key to decrypt is something stored inside the ipad and the key do the rest,i'm most into x86...
usual downloaded magz are in the applications-readr- Library/cache/issues/**a number/another directories with numbers/ and page_0xx_small or medium or large and jpg extension,a file with search_terms.plist and a keyfile,all that encrypted
the keyfile look like this in hex:6B 65 79 73 00 00 00 00 00 00 00 B4 where B4 is the unique changing byte for each magz.
maybe some reversers here are able to help me.
greets and thanks for this place.