I’m considering doing reverse engineering on the Sora 2 iOS API and am looking for potential collaborators. I’ve obtained an IPA package, but I noticed that it uses DeviceCheck. From my understanding, this is almost unsolvable, because we can’t generate a valid token on a non-jailbroken device. So how do many third-party APIs that claim to use reversed iOS protocols actually manage to do this?