You must log in or register to comment.
Not in this one, iirc they actually reverse engineered and were working off of apple libraries, rather than proxies.
Does it make a difference? They still need to use Apple accounts and spoof real devices (serial numbers, etc, I’m guessing)