0: https://infosec.exchange/@opa334/114224756352953362
1: https://gist.github.com/wh1te4ever/c7909dcb5b66c13a217b49ea3...
0: https://infosec.exchange/@opa334/114224756352953362
1: https://gist.github.com/wh1te4ever/c7909dcb5b66c13a217b49ea3...
Which ones are you thinking of? Does Grab operate this way?
The China case is well-known, but that's really its own beast. KakaoTalk (Korea), while more of an 'everything' app than those in the West, is still a far cry from containing a mini app store. A user can't choose to add any new functionality by installing something - it's all included right from the get-go. My (limited) experience with Line (Japan, Taiwan, Thailand) is similar. So I'm curious if there's any non-Chinese apps you can name.
FWIW I'm not arguing against your fundamental premise, would just like to know which do-everything apps you mean.
My understanding is it's because there was some regulatory change in the last 1-2 years requiring identity fingerprinting using banking apps, and partially related with the new biometrics rollout [0]
[0] - https://xaydungchinhsach.chinhphu.vn/huong-dan-cai-dat-sinh-...
Are they able to load a .so/dylib file during runtime and just call a method on it as long as they know the name of the method? How does iOS even allow that? How does an iOS even get to load those files? Seems like that would be locked down.
I also don't think that this deserves to be called anything as scary as an "zero day exploit", "sandbox escape".
Yes, usually that's the entire point of an .so/.dylib/.dll - to load it and call it's functions by name?
> How does iOS even allow that? How does an iOS even get to load those files? Seems like that would be locked down.
Because it's something that higher level apple interfaces might rely on. It's not a security issue in the first place - if you submit an app obviously using them the message you get is:
> The use of non-public APIs is not permitted on the App Store because it can lead to a poor user experience should these APIs change.
I think app enumeration info leaks generically might be eligible for that bounty, though, so mentioning it doesn’t seem too wild.
.so/.dylib/.dll's typically get linked at load time, right? Like we aren't all manually loading dylibs in our source code. I guess I'm surprised on a platform as locked down as ios that they even allow you to link anything at run time.
chatgpt gives me this snippet but I have no way of knowing if this is roughly how it would look.
Class SBApplication = objc_getClass("SBApplication");
SEL launchSel = sel_registerName("launch");
id app = [SBApplication getAppWithBundleID:@"com.example.app"];
objc_msgSend(app, launchSel);
Though if it's similar to Line I wouldn't even count Zalo either, as said, from what I've seen with Line it doesn't have an app-store-in-app, all functionalities are predetermined and preinstalled. It just does a lot of things, but that in itself doesn't go against any App Store rules.