Hi, going beyond starring your repo, to tell you: that's just really amazing example of pwning / abusing Apple protocols :) You are doing great job! That's also in general about Positive Security ! Best regards, Peter