

Product: Reverse Engineering
This session is part of the Introduction to Political Technology course at Newspeak House, open to faculty and fellowship candidates only.
What's the next best thing to building products?
Breaking them.
By the end of this session, you should know how to break any app open.
Areas we'll cover:
Decompiling apps
Making sense of obfuscated codebases
Hooking into apps at runtime
Forcing UI states
Locating assets inside a large directory
This will be less of a workshop and more of a lecture. This is because setting up an environment for reverse engineering is too time consuming for the session. The technical/willing among you can take this information away and w̶r̶e̶c̶k̶ ̶h̶a̶v̶o̶k̶ investigate products politely.
Disclaimer: I am obviously not responsible for anything you do with this information.