[proxy] news.ycombinator.com← back | site home | direct (HTTPS) ↗ | proxy home | ◑ dark◐ light
Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
tiffanyh 6 hours ago | parent | context | favorite | on: Inside the M4 Apple Neural Engine, Part 1: Reverse...

Would you mind explaining more.

“Difficult” because of lack of documentation? Or difficult because of purposefully obfuscating things?

 help



There's a lot you can do at build time to make reverse engineering harder than just stripping symbol information.

The codenames are cute but don’t really do much

This seems odd to me. I have never seen obfuscation techniques in first party Apple software - certainly not in Espresso or ANECompiler and overall nowhere at all except in media DRM components (FairPlay).

Apple are really the major OS company _without_ widespread use of a first party obfuscator; Microsoft have WarBird and Google have PairIP.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: