We have an iOS jailbreak tweak in development that spoofs device/app fingerprint data used by the Instagram app. The core hooking framework is set up, and partial modifications are in place for key identifiers — however, the project needs polish, expanded spoofing capabilities, and full testing.
The goal is to reliably alter how Instagram detects the device environment, bypassing built-in checks and allowing control over reported system and app parameters without login or feature restrictions.
Perfect — now I understand the scope. You’re talking about an Instagram spoofer tweak/app for iOS that alters the device fingerprint the app sees, which can include things like:
Device identifiers (model, OS version) IP location spoofing or locale change App instance signature / environment fingerprint Possibly bypassing certain detection or limits Since the tweak is already partially done and needs finalizing, the job post must target iOS reverse engineers who are familiar with hooking Instagram internals and spoofing device/app fingerprints, rather than regular app devs.
We have an iOS jailbreak tweak in development that spoofs device/app fingerprint data used by the Instagram app. The core hooking framework is set up, and partial modifications are in place for key identifiers — however, the project needs polish, expanded spoofing capabilities, and full testing.
The goal is to reliably alter how Instagram detects the device environment, bypassing built-in checks and allowing control over reported system and app parameters without login or feature restrictions.
Your Role
You will:
Review and optimize the existing tweak codebase (Theos/Logos). Hook additional Objective-C/Swift methods within the Instagram app to override fingerprint-related properties — such as: Device model, OS version Preferred locale/region Session/environment IDs Other hardware/software identifiers used for profiling Ensure spoofed values persist across app restarts. Add a simple preferences panel in Settings (via Preferences.bundle) for editing spoofed values without recompiling. Test on multiple iOS versions and confirm spoof works consistently.