Reverse Engineering TikTok's VM Obfuscation (Part 1)
tl;dr: "The platform has implemented various methods to make it difficult for reverse-engineers to understand exactly what data is being collected and how it is being used. Analyzing the call stack of a request made on tiktok can begin to paint the picture for us."featured in #379
Inside TikTok's Killer Algorithm
- Sara Fischer tl;dr: New users are shown 8 popular videos, each representing a different trend or topic. Users and videos are clustered separately and, based on users' engagement, the user is recommended videos from the appropriate cluster. TikTok concede this creates "filter bubbles."featured in #206
featured in #203