Discussion in 'Windows 10' started by vyvojar, Aug 26, 2016.
You need to login to view this posts content.
I'm now looking into Metro stuff policy edits (beyond just enabling sideloading).
This one looks particularly worrisome:
It looks like the direct warbird API call (heavily obfuscated API between kernel policy cache and the user app). Has anyone succeeded in API tracing calls to clipc.dll from an UWP app?