@i0n1c It does not. This path is for the access() call, not for the actual enforcement.
-
-
-
@hey_pom yes for the access() syscall family the sandbox check is not performed for whatever reason -
@i0n1c that's right. But it doesn't mean they can execute, it means we make them believe they could. -
- View other replies
-
-
-
- View other replies
-
- Show more
-
-
@i0n1c@TimelessP other controls. -
@i0n1c Do you have more context? The way this has been presented, most will assume the sandbox is completely bypassed by Blizzard. -
-
@i0n1c is blizzard the only one with this privilege? They don't even do jailbreak detection in their apps... -
-
@Switch72nd Do they do anything with it? I haven't had mobile auth complain at me before. -
@Nohamos not sure. Haven't had a jailbroken device since iOS 7
-
-
@i0n1c For example, there are thousands of shims like that in Windows' source code so that a popular app from 1995 still works. -
@i0n1c Hmmmm…hasn't Blizzard demo'd at keynotes and WWDC? Gee, isn't that convenient? -
@i0n1c Without more context, I'd say it's a "compatibility hack" to avoid that a popular app ceases to work in the platform. -
@i0n1c 操尼玛、你个傻逼
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
Stefan Esser
POM
Cabel Sasser
Will Strafach
Dan Kaminsky
Nick Arnott
Nohamos
James Chamberlain
Daniel Martín
Scott
Rocco
pangyonhbin