So, I see a lot of people thanking the developers for their hard work. I would say, rightfully so, and well deserved. But if you think that PF developers are doing it on their own, that will be crazy. My assumption is that; it is a collaborative effort of all bot makers, map makers, and other enthusiast, and this community of developers work together to ***** the API. Single handedly *****ing this is just insane. It is after they broke the API, when they go separate ways and apply it on their own bots.
So, to ease up some anxiety, so you can gauge where they are in the development, and maybe predict the date on your own here’s some insight on their progress (information obtained from another web site)
7 October 2016, GMT +0, 19:00 – Niantic now requires version 0.39 for any API requests (actually only getmapobjects). This means all scanners are broken. The devs were still working on the captcha-fix, and they will start the RE-effort tomorrow, after a good night sleep.
With the decline of popularity of pokemongo, so has the dev-community declined. There no longer are 100’s of people stumbling over each other to help. Also the difficulty of reverse engineering has gone up significantly between because of the different security updates by Niantic, especially the obfuscation. The entry barrier to start contributing to the RE-effort has gone up significantly
8 October 2016, GMT +0, 14:00 - Devs are working on getting debugging working. If they are able to insert breakpoints (stop-frames) they could start the actual reverse engineering.
9 October 2016, GMT +0, 23:00 - There is a lack of developers actively working on the RE. There is one dev making progress though.
The one guy who is still getting stuff done is the FPM-dev. (Fast Poke Map) He has found a way to reverse engineer despite the obfuscation. The obfuscation has made it that much more tedious, but he's got it working. He has stated on his Twitter that he won't share the API-break if his share of reverse engineering continues to be as big as it is, which makes sense.
10 October 2016, GMT +0, 20:00 - A couple of people have applied, things are looking a bit better again.
There is some action on the RE-front again, the FPM-dev is no longer the only one working on it, still has the biggest input, but steps are being taken to turn his solo-effort into a community-effort again. There are some more people who have applied but are still working to get their debuggingphones working. The devs are working to undo the obfuscation and they are hoping to find the start of the encryption (actually hashing) process.
11 October 2016, GMT +0, 11:00 - Niantic launched version 0.41.2. Devs have confirmed that this update did not bring about new security measures.
11 October 2016, GMT +0, 23:00 - Devs are making good progress, nothing spectacular though, because it is a slow process.
Right now it is just tedious debugging. The FPM dev is still taking the lead but more help is continuously flowing in. Experienced Reverse Engineers are still welcome. There are a few others looking to poke the IOS pokemongo client.
The devs are trying to understand the security/obfuscation. This requires that they make a map (codeflow) of the obfuscation/encryption. The securitymeasures taken by Niantic (or who their contractors) are designed to be difficult to map, they made it as tedious as possible to RE. The devs are confident that they will eventually beat the security though.
13 October 2016, GMT +0, 01:30 - The devs have (probably) found the beginnning of the encryption/hashing. They knew they were getting close, but actually finding it is nice (and a relief). This is a breaktrough. By now the devs are pretty used to the limitations the obfuscation forces upon them and they think they can do the remaining part of the RE quicker.
FastPokeMaps believes their site can be running again by friday/saturday he tweeted, there is a small catch with the ETA I believe though: The devs are taking for granted that the IOS encryption is the same as the android encryption. They have reverse engineered android with the intention to use that to make IOS API requests, to dodge Safetynet. There are no indications, nor a precedent that Niantic has made android encryption different from IOS, but they could have.
There is another catch, captcha is still a problem. this is just the FPM-dev his guess as to when he can complete the API. He can still be wrong.
There is a small but dedicated and extremely skilled devteam working on RE, and it is working. It is a lot smaller than the 30-man team that did the first API-break. There are up- and downsides but the amount of chaos during the first API-break is something noone misses.
13 October 2016, GMT +0, 01:30 Safetynet got updated again, sigh. There is probably a workaround but for now the devs need to find it. This can take a couple of hours.
FPM twitter said the following: "One of the reason i want to avoid making the api public is to avoid tools like bots to come back." The FPM-dev doesn't like everyone having the access to a bot.
14 October, GMT +0, 02:00 - The devs are making progress. They are mostly done with the obfuscation
15 October, GMT +0, 01:00 - It seems like little progress has been made today. In general it feels like everyone had a collective off-day. The devs are looking for the last piece of the puzzle. They are looking for the encryption (xxhash seed) that Niantic is using. It's buried somewhere...
Maybe friday is just the day everyone is busy, because last friday, when the API broke, there were little people working on it. Hopefully the devs can finish the job over the next couple of days, like the FPM-dev predicted.
Please don’t post any useless and senseless personal comments after this. Allow others to read this instead of burying it under multiple “intelligent” comments and useless bickering and insults.
So, to ease up some anxiety, so you can gauge where they are in the development, and maybe predict the date on your own here’s some insight on their progress (information obtained from another web site)
7 October 2016, GMT +0, 19:00 – Niantic now requires version 0.39 for any API requests (actually only getmapobjects). This means all scanners are broken. The devs were still working on the captcha-fix, and they will start the RE-effort tomorrow, after a good night sleep.
With the decline of popularity of pokemongo, so has the dev-community declined. There no longer are 100’s of people stumbling over each other to help. Also the difficulty of reverse engineering has gone up significantly between because of the different security updates by Niantic, especially the obfuscation. The entry barrier to start contributing to the RE-effort has gone up significantly
8 October 2016, GMT +0, 14:00 - Devs are working on getting debugging working. If they are able to insert breakpoints (stop-frames) they could start the actual reverse engineering.
9 October 2016, GMT +0, 23:00 - There is a lack of developers actively working on the RE. There is one dev making progress though.
The one guy who is still getting stuff done is the FPM-dev. (Fast Poke Map) He has found a way to reverse engineer despite the obfuscation. The obfuscation has made it that much more tedious, but he's got it working. He has stated on his Twitter that he won't share the API-break if his share of reverse engineering continues to be as big as it is, which makes sense.
10 October 2016, GMT +0, 20:00 - A couple of people have applied, things are looking a bit better again.
There is some action on the RE-front again, the FPM-dev is no longer the only one working on it, still has the biggest input, but steps are being taken to turn his solo-effort into a community-effort again. There are some more people who have applied but are still working to get their debuggingphones working. The devs are working to undo the obfuscation and they are hoping to find the start of the encryption (actually hashing) process.
11 October 2016, GMT +0, 11:00 - Niantic launched version 0.41.2. Devs have confirmed that this update did not bring about new security measures.
11 October 2016, GMT +0, 23:00 - Devs are making good progress, nothing spectacular though, because it is a slow process.
Right now it is just tedious debugging. The FPM dev is still taking the lead but more help is continuously flowing in. Experienced Reverse Engineers are still welcome. There are a few others looking to poke the IOS pokemongo client.
The devs are trying to understand the security/obfuscation. This requires that they make a map (codeflow) of the obfuscation/encryption. The securitymeasures taken by Niantic (or who their contractors) are designed to be difficult to map, they made it as tedious as possible to RE. The devs are confident that they will eventually beat the security though.
13 October 2016, GMT +0, 01:30 - The devs have (probably) found the beginnning of the encryption/hashing. They knew they were getting close, but actually finding it is nice (and a relief). This is a breaktrough. By now the devs are pretty used to the limitations the obfuscation forces upon them and they think they can do the remaining part of the RE quicker.
FastPokeMaps believes their site can be running again by friday/saturday he tweeted, there is a small catch with the ETA I believe though: The devs are taking for granted that the IOS encryption is the same as the android encryption. They have reverse engineered android with the intention to use that to make IOS API requests, to dodge Safetynet. There are no indications, nor a precedent that Niantic has made android encryption different from IOS, but they could have.
There is another catch, captcha is still a problem. this is just the FPM-dev his guess as to when he can complete the API. He can still be wrong.
There is a small but dedicated and extremely skilled devteam working on RE, and it is working. It is a lot smaller than the 30-man team that did the first API-break. There are up- and downsides but the amount of chaos during the first API-break is something noone misses.
13 October 2016, GMT +0, 01:30 Safetynet got updated again, sigh. There is probably a workaround but for now the devs need to find it. This can take a couple of hours.
FPM twitter said the following: "One of the reason i want to avoid making the api public is to avoid tools like bots to come back." The FPM-dev doesn't like everyone having the access to a bot.
14 October, GMT +0, 02:00 - The devs are making progress. They are mostly done with the obfuscation
15 October, GMT +0, 01:00 - It seems like little progress has been made today. In general it feels like everyone had a collective off-day. The devs are looking for the last piece of the puzzle. They are looking for the encryption (xxhash seed) that Niantic is using. It's buried somewhere...
Maybe friday is just the day everyone is busy, because last friday, when the API broke, there were little people working on it. Hopefully the devs can finish the job over the next couple of days, like the FPM-dev predicted.
Please don’t post any useless and senseless personal comments after this. Allow others to read this instead of burying it under multiple “intelligent” comments and useless bickering and insults.
Last edited: