To create a virtual environment, go to the root of your project and run
python3 -m venv ./venv
It will create a virtual environment called venv
./venv/bin/activate
| { | |
| "installedToolchains" : [], | |
| "platform" : { | |
| "namePretty" : "macOS", | |
| "architecture" : null, | |
| "name" : "xcode", | |
| "nameFull" : "osx" | |
| } | |
| } |
Warning
This is patched as of iOS/iPadOS 18.1 DevBeta 5. If you want to follow this, stay on Beta 4.
Inspired by https://infosec.exchange/@jjtech/112612685494089718
Reboot into Recovery OS + Disable SIP
csrutil disable
| #!/bin/bash | |
| echo "Please make sure GPTK dmg is mounted" | |
| read -p "Press enter to continue" | |
| # Install GPTK | |
| ditto /Volumes/Game\ Porting\ Toolkit-1.0/lib/ ~/Library/Application\ Support/Whisky/Libraries/Wine/lib | |
| cd ~/Library/Application\ Support/Whisky/Libraries/Wine/lib |
You also might wanna just use Whisky which does this automatically
This guide works on macOS 13.4+ using Command Line Tools for XCode 15 Beta!
In the recent WWDC, Apple announced and released the "game porting toolkit", which upon further inspection this is just a modified version of CrossOver's fork of wine which is a "compatibility layer" that allows you to run Windows applications on macOS and Linux.
| Unfortunately I have some bad news for downgrading. | |
| Before I explain the bad news at the end of this post, I first need to introduce a background of iOS devices. | |
| In iOS 16, Apple introduced a new firmware component known as Cryptex1. Technically, this is a "virtual" co-processor. | |
| It's purpose is to allow Apple to push RSRs (Rapid Security Responses) which are separate from traditional iOS updates and can be installed much faster. | |
| Like other firmwares, it also has a signing ticket locked to a cryptographic nonce (number-used-once). | |
| We commonly refer to the Apple signing tickets as SHSH blobs. | |
| Meaning the firmware can't be installed without a valid signing ticket as well as a matching nonce. | |
| The "big two" components we deal with signing/nonces are AP and SEP. AP is basically the main device chip (Application Processor). | |
| SEP is the security chip (Secure Enclave Processor). | |
| With regards to APNonce, Apple conveniently gave us the com.apple.System.boot-nonce NVRAM property which we use to set the APNonce generator. |