Some notes and tools for reverse engineering / deobfuscating / unminifying obfuscated web app code.
MitID is a very finicky app that sometimes stops working in GrapheneOS. For that reason I strongly recommend disabling automatic updates for this particular app in the Play Store, and only updating when there is evidence that the new version will keep working. It's also worth it to order a code display as a back up authenticator — it's free.
For the sake of other users I will try my best to document here which versions work and which don't work.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
**As a developer you have complete control over the signup and signin functionality...** | |
```shell | |
$ surreal sql --conn http://localhost:8000 --user root --pass root --ns test --db test | |
``` | |
```sql | |
-- optional : this is the default see --ns test --db test start server flags | |
-- USE NS test DB test; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
0 | |
01 | |
02 | |
03 | |
0_ | |
1 | |
10 | |
100 | |
101 | |
102 |