I hereby claim:
- I am ensingerphilipp on github.
- I am ensi (https://keybase.io/ensi) on keybase.
- I have a public key ASBah2gTaUraxsNIrtV0T368yfrf0exny8VvbW9WOSTSqAo
To claim this, I am signing this object:
| package chaCha20Poly1305Encryption; | |
| import javax.crypto.*; | |
| import javax.crypto.spec.IvParameterSpec; | |
| import javax.crypto.spec.SecretKeySpec; | |
| import java.security.InvalidAlgorithmParameterException; | |
| import java.security.InvalidKeyException; | |
| import java.security.NoSuchAlgorithmException; | |
| import java.security.spec.AlgorithmParameterSpec; | |
| import java.util.Base64; |
| import org.bouncycastle.crypto.generators.Argon2BytesGenerator; | |
| import org.bouncycastle.crypto.params.Argon2Parameters; | |
| import org.bouncycastle.jce.provider.BouncyCastleProvider; | |
| import javax.crypto.NoSuchPaddingException; | |
| import java.security.NoSuchAlgorithmException; | |
| import java.security.SecureRandom; | |
| import java.security.Security; | |
| import java.util.Base64; |
| package ecdsaSignature; | |
| import java.security.*; | |
| import java.security.spec.ECGenParameterSpec; | |
| public class ECDSAKeyGenerator { | |
| public static KeyPair generateKeyPair() throws NoSuchAlgorithmException, InvalidAlgorithmParameterException { | |
| //It is required to use an epileptic Curve with Security Strength <= Security Strength of the used Hashing Function |
| package ecdsaSignature; | |
| import java.security.Security; | |
| import java.util.Arrays; | |
| //Helper Class to print all supported Epileptic Curves for use in ECDSA | |
| //Refer to http://safecurves.cr.yp.to for a list of save epileptic curves | |
| public class ShowSupportedCurves |
| package rsaEncryption; | |
| import javax.crypto.BadPaddingException; | |
| import javax.crypto.Cipher; | |
| import javax.crypto.IllegalBlockSizeException; | |
| import javax.crypto.NoSuchPaddingException; | |
| import javax.crypto.spec.OAEPParameterSpec; | |
| import javax.crypto.spec.PSource; | |
| import java.security.*; | |
| import java.security.spec.MGF1ParameterSpec; |
| package rsaSignature; | |
| import java.security.KeyPair; | |
| import java.security.KeyPairGenerator; | |
| import java.security.NoSuchAlgorithmException; | |
| import java.security.SecureRandom; | |
| public class RsaKeyGenerator { | |
| //Generate RSA Key with size of at least 3072 bits |
I hereby claim:
To claim this, I am signing this object:
| #!/usr/bin/env zsh | |
| set -e; | |
| set +m; # Job control would've been nice, but manual round robin it is, sigh. | |
| if [ -z "${ZSH_VERSION+x}" ]; then | |
| echo 'Try again with zsh.'; | |
| exit 1; | |
| fi; |
So, I got bored and decided to do more research into alternates. Turns out you can still abuse it to update to a currently signed Version (15.4.1 as of writing) on iOS versions that don't support alternates. You're welcome.
This requires a jailbreak. Of course, you can do the backup editing stuff if you're not JBed but:
| The MIT License (MIT) | |
| Copyright (c) 2015 Felix Hummel | |
| Permission is hereby granted, free of charge, to any person obtaining a copy of | |
| this software and associated documentation files (the "Software"), to deal in | |
| the Software without restriction, including without limitation the rights to | |
| use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies | |
| of the Software, and to permit persons to whom the Software is furnished to do | |
| so, subject to the following conditions: |