Oh yeah, you shouldn’t. But people do this for fingerprinting, bot detection, and other “adversarial” scenarios where you really don’t like the person executing your code. It’s somewhat plausible Google would use this technique to do something scummy like this (although that is not the case).
Just because you can…
Oh yeah, you shouldn’t. But people do this for fingerprinting, bot detection, and other “adversarial” scenarios where you really don’t like the person executing your code. It’s somewhat plausible Google would use this technique to do something scummy like this (although that is not the case).
Relevant article and a great read: https://www.nullpt.rs/reverse-engineering-tiktok-vm-1