Jump to content

2 posts in this topic

Recommended Posts

Posted

Hi,

i've an app,readr by pixelmags @hxxp://www.readrapp.com/

 

well known to read magazines,you probably know it with all the flex tweaks and complaints about the anytime hacks but after research i can't find how to reverse and find the encryption used?!
all downloaded magz are encrypted with aes256,a key with 1 hex char for each mag,the magz can be read offline,i conclude that the key to decrypt is something stored inside the ipad and the key do the rest,i'm most into x86...

 

usual downloaded magz are in the applications-readr- Library/cache/issues/**a number/another directories with numbers/ and page_0xx_small or medium or large and jpg extension,a file with search_terms.plist and a keyfile,all that encrypted
 

 

the keyfile look like this in hex:6B 65 79 73 00 00 00 00 00 00 00 B4 where B4 is the unique changing byte for each magz.

 

maybe some reversers here are able to help me.

 

greets and thanks for this place.

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
  • Create New...

Important Information

We would like to place cookies on your device to help make this website better. The website cannot give you the best user experience without cookies. You can accept or decline our cookies. You may also adjust your cookie settings. Privacy Policy - Guidelines