Quote:
Originally Posted by diabl0w
and I've been able to use root capabilities to intercept the encrypted update in an unencrypted form for each new update
|
How did you "intercept"? I'm curious about this. Is it complicated hack or just dumping it out after the update completes?