19 Jan 25

Join Sam Loose as he continues to uncover the secrets of audio compression. Go beyond “how to compress” and dive into “the why” when using compression to enh…

by chrisSt 11 months ago

04 Dec 23

Many apps use API keys when authenticating network requests. Although there are better ways of authenticating requests like OAuth with PKCE, but it might not always be possible. One thing what we must keep in mind is that it is fairly simple to extract strings from IPA files and therefore, if we store API keys…

by chrisSt 2 years ago