do {

re-sign decrypted binary (with Apple Developer account)

decrypt iOS app (from jailbroken device memory)

find resources of an app (on jailbroken device)

static Mach-O binary analyse

} catch _ {

11/10/2020 Amazon Kindle: iOS App Reverse Engineering for eBooks Leaking
04/10/2020 Alpina.Books: iOS App Forensics for eBooks Smuggling
27/09/2020 Back-port .fullScreenCover to SwiftUI 1.0
30/10/2019 [co-author] ProtonMail iOS client security
30/10/2019 [co-author] Security recommendation: enable FaceID or PIN protection on the ProtonMail iOS app
23/07/2019 Iterating over SwiftUI views delivered in a Swift Package
24/03/2018 24/7 Accelerometer Tracking with Apple Watch
16/03/2018 Using Raspberry Pi as an Apple TimeMachine
09/07/2017 Adaptive Design in iOS
15/03/2017 OWASP for iOS: M1 - Improper Platform usage, Part 2
29/01/2017 Unified Logging and Activity Tracing
24/12/2016 OWASP for iOS: M1 - Improper Platform usage, Part 1
04/05/2016 Swift, Perfect, mustache and PostgreSQL on Heroku - 4
03/05/2016 Swift, Perfect, mustache and PostgreSQL on Heroku - 3
01/05/2016 Swift, Perfect, mustache and PostgreSQL on Heroku - 2
30/04/2016 Swift, Perfect, mustache and PostgreSQL on Heroku

}