Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

9.1.x Solution Update #9

Open
elessdee opened this issue Nov 2, 2016 · 1 comment
Open

9.1.x Solution Update #9

elessdee opened this issue Nov 2, 2016 · 1 comment

Comments

@elessdee
Copy link

elessdee commented Nov 2, 2016

Thanks for your great work in the past! I see that a few months ago, there was a "bananas file" which included keys to decrypt media, but after a more recent Snapchat release, that data is now downloaded as needed instead (presumably).

Do you know of any update on this subject, or any potential means to decrypt these .jpg.nomedia files that still exist?

Do you have any guesses as to why these .jpg.nomedia files are kept in the first place; why they're not deleted? Presumably this must be so that they're accessed again in some way, but how is that triggered? I thought that perhaps they're downloaded to these .jpg.nomedia files first, then when the user views them, they're decrypted for viewing, then perhaps they're never used again. I attempted to get Snapchat to decrypt an old file by getting it to download a new image, but not viewing it, then renaming the old filename to the new filename, then going to view it, but no dice; it showed the correct image rather than the old one.

There must be a way to snag those encryption keys on a rooted device in some way, but doing so myself I think is beyond my capability; trying to see if anyone else has figured out some method.

Thank you for your time & thoughts! Cheers, Kim

@gregorynicholas
Copy link

👍

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants