Skip to content

9.1.x Solution Update #9

@elessdee

Description

@elessdee

Thanks for your great work in the past! I see that a few months ago, there was a "bananas file" which included keys to decrypt media, but after a more recent Snapchat release, that data is now downloaded as needed instead (presumably).

Do you know of any update on this subject, or any potential means to decrypt these .jpg.nomedia files that still exist?

Do you have any guesses as to why these .jpg.nomedia files are kept in the first place; why they're not deleted? Presumably this must be so that they're accessed again in some way, but how is that triggered? I thought that perhaps they're downloaded to these .jpg.nomedia files first, then when the user views them, they're decrypted for viewing, then perhaps they're never used again. I attempted to get Snapchat to decrypt an old file by getting it to download a new image, but not viewing it, then renaming the old filename to the new filename, then going to view it, but no dice; it showed the correct image rather than the old one.

There must be a way to snag those encryption keys on a rooted device in some way, but doing so myself I think is beyond my capability; trying to see if anyone else has figured out some method.

Thank you for your time & thoughts! Cheers, Kim

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions