I hereby claim:
- I am exspir3 on github.
- I am ensi (https://keybase.io/ensi) on keybase.
- I have a public key ASBah2gTaUraxsNIrtV0T368yfrf0exny8VvbW9WOSTSqAo
To claim this, I am signing this object:
package chaCha20Poly1305Encryption; | |
import javax.crypto.*; | |
import javax.crypto.spec.IvParameterSpec; | |
import javax.crypto.spec.SecretKeySpec; | |
import java.security.InvalidAlgorithmParameterException; | |
import java.security.InvalidKeyException; | |
import java.security.NoSuchAlgorithmException; | |
import java.security.spec.AlgorithmParameterSpec; | |
import java.util.Base64; |
import org.bouncycastle.crypto.generators.Argon2BytesGenerator; | |
import org.bouncycastle.crypto.params.Argon2Parameters; | |
import org.bouncycastle.jce.provider.BouncyCastleProvider; | |
import javax.crypto.NoSuchPaddingException; | |
import java.security.NoSuchAlgorithmException; | |
import java.security.SecureRandom; | |
import java.security.Security; | |
import java.util.Base64; |
package ecdsaSignature; | |
import java.security.*; | |
import java.security.spec.ECGenParameterSpec; | |
public class ECDSAKeyGenerator { | |
public static KeyPair generateKeyPair() throws NoSuchAlgorithmException, InvalidAlgorithmParameterException { | |
//It is required to use an epileptic Curve with Security Strength <= Security Strength of the used Hashing Function |
package ecdsaSignature; | |
import java.security.Security; | |
import java.util.Arrays; | |
//Helper Class to print all supported Epileptic Curves for use in ECDSA | |
//Refer to http://safecurves.cr.yp.to for a list of save epileptic curves | |
public class ShowSupportedCurves |
package rsaEncryption; | |
import javax.crypto.BadPaddingException; | |
import javax.crypto.Cipher; | |
import javax.crypto.IllegalBlockSizeException; | |
import javax.crypto.NoSuchPaddingException; | |
import javax.crypto.spec.OAEPParameterSpec; | |
import javax.crypto.spec.PSource; | |
import java.security.*; | |
import java.security.spec.MGF1ParameterSpec; |
package rsaSignature; | |
import java.security.KeyPair; | |
import java.security.KeyPairGenerator; | |
import java.security.NoSuchAlgorithmException; | |
import java.security.SecureRandom; | |
public class RsaKeyGenerator { | |
//Generate RSA Key with size of at least 3072 bits |
I hereby claim:
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
#!/usr/bin/env zsh | |
set -e; | |
set +m; # Job control would've been nice, but manual round robin it is, sigh. | |
if [ -z "${ZSH_VERSION+x}" ]; then | |
echo 'Try again with zsh.'; | |
exit 1; | |
fi; |
So, I got bored and decided to do more research into alternates. Turns out you can still abuse it to update to a currently signed Version (15.4.1 as of writing) on iOS versions that don't support alternates. You're welcome.
This requires a jailbreak. Of course, you can do the backup editing stuff if you're not JBed but: