• Natanael@slrpnk.net
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    1 year ago

    All they need to do is look for which Apple devices are being used as proxies and blacklist them

    • IAm_A_Complete_Idiot
      link
      fedilink
      English
      arrow-up
      4
      ·
      1 year ago

      Not in this one, iirc they actually reverse engineered and were working off of apple libraries, rather than proxies.

      • Natanael@slrpnk.net
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        Does it make a difference? They still need to use Apple accounts and spoof real devices (serial numbers, etc, I’m guessing)