Book Image

Learning iOS Security

Book Image

Learning iOS Security

Overview of this book

Table of Contents (13 chapters)

Summary


There are a number of places where we stopped ourselves from writing more in this chapter. This chapter does not provide in-depth information about packet capturing, forensic acquisition, application development, or iOS systems internals. Instead, similar to the rest of the book, we are pointing you towards the necessary content to do more if you choose.

The authors of this book are strong proponents of the hacker mentality. There really isn't more security information about devices that are available without jailbreaking devices or accessing Apple's Developer portal at http://developer.apple.com. We do hope that you will do them both at some point. We don't believe that you can fully secure a jail broken device, so you should, therefore, refrain from putting them into production. However, we also believe in learning as much as we can, which means eventually jailbreaking a device and seeing what really makes those little Speak-and-Spell apps tick.