Is there a legitimate reason for it not being reverse-engineered yet?
The actual protocol isn’t a secret. It’s that the authentication of the device relies on a hardware key, and that key is fully locked down by Apple (as it also secures the user’s biometric logins, keyring, financial information in Apple Wallet, etc.).
The actual protocol isn’t a secret. It’s that the authentication of the device relies on a hardware key, and that key is fully locked down by Apple (as it also secures the user’s biometric logins, keyring, financial information in Apple Wallet, etc.).
If it relies on a hardware key then why is it that I can get the same setup working with a macos virtual machine?
Using [BlueBubbles] (https://bluebubbles.app/) for anyone wondering.