-
Hello, has anyone looked into creating a usable, decrypted iOS backup? (As in, you can restore the decrypted backup with macOS Finder.)
This works for a few minutes, but then Finder reports that "the backup is corrupt". I'd guess that most of my top-level checks are fine (remove passcode key stuff, change file protection classes), but something is off about how I'm doing the per-file bplist in Manifest.db. Does anyone know if this has been implemented somewhere? Or debugging steps that can help me figure out what Finder is doing when it reports corruption? |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments
-
Ah, I think I have a lead on this: the file size recorded in Manifest.db is sometimes substantially smaller than the actual size of the file, though the recorded SHA1 hash will match. I think this
Having incorrect data on the encryption and decryption side is more than a little annoying. I hope I can brute force one or both sides of the process, rather than having to manually inspect the "corrupt" files each time. |
Beta Was this translation helpful? Give feedback.
-
Okay, I have found that SQLite databases in a backup directory will be decrypted incorrectly because of this Manifest.db size-mismatch issue. This is extremely troubling (important databases like SMS.db can get truncated), but since it's in an upstream project, there's nothing to do here. |
Beta Was this translation helpful? Give feedback.
Okay, I have found that SQLite databases in a backup directory will be decrypted incorrectly because of this Manifest.db size-mismatch issue. This is extremely troubling (important databases like SMS.db can get truncated), but since it's in an upstream project, there's nothing to do here.