You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Thanks for your great work in the past! I see that a few months ago, there was a "bananas file" which included keys to decrypt media, but after a more recent Snapchat release, that data is now downloaded as needed instead (presumably).
Do you know of any update on this subject, or any potential means to decrypt these .jpg.nomedia files that still exist?
Do you have any guesses as to why these .jpg.nomedia files are kept in the first place; why they're not deleted? Presumably this must be so that they're accessed again in some way, but how is that triggered? I thought that perhaps they're downloaded to these .jpg.nomedia files first, then when the user views them, they're decrypted for viewing, then perhaps they're never used again. I attempted to get Snapchat to decrypt an old file by getting it to download a new image, but not viewing it, then renaming the old filename to the new filename, then going to view it, but no dice; it showed the correct image rather than the old one.
There must be a way to snag those encryption keys on a rooted device in some way, but doing so myself I think is beyond my capability; trying to see if anyone else has figured out some method.
Thank you for your time & thoughts! Cheers, Kim
The text was updated successfully, but these errors were encountered:
Thanks for your great work in the past! I see that a few months ago, there was a "bananas file" which included keys to decrypt media, but after a more recent Snapchat release, that data is now downloaded as needed instead (presumably).
Do you know of any update on this subject, or any potential means to decrypt these .jpg.nomedia files that still exist?
Do you have any guesses as to why these .jpg.nomedia files are kept in the first place; why they're not deleted? Presumably this must be so that they're accessed again in some way, but how is that triggered? I thought that perhaps they're downloaded to these .jpg.nomedia files first, then when the user views them, they're decrypted for viewing, then perhaps they're never used again. I attempted to get Snapchat to decrypt an old file by getting it to download a new image, but not viewing it, then renaming the old filename to the new filename, then going to view it, but no dice; it showed the correct image rather than the old one.
There must be a way to snag those encryption keys on a rooted device in some way, but doing so myself I think is beyond my capability; trying to see if anyone else has figured out some method.
Thank you for your time & thoughts! Cheers, Kim
The text was updated successfully, but these errors were encountered: