top | item 3752000

(no title)

shangrila | 14 years ago

They certainly could still add a new API which does something along the lines of what you describe while still deprecating the UDID API. The only real catch is that they'd had have to do it in such a way as to make it difficult to figure out the un-hashed UDID from the value they give you. It's certainly possible to do that, though. For example, instead of hashing the UDID along with the keychain identifier, they could hash it along some other app-specific or vendor-specific info which only Apple knows and is not shared with developers.

discuss

order

tomjen3|14 years ago

If a company can reverse engineer sha512 that easily, we got bigger problems that leaking device numbers.

maukdaddy|14 years ago

And that company sure as hell isn't wasting time developing iOS apps.

stcredzero|14 years ago

No reverse engineering of SHA512 or other hash algorithm is necessary. Left as an exercise for the truly curious about security. (Hint, you can get the same information from much lower hanging fruit.)