Book Image

Learning iOS Security

Book Image

Learning iOS Security

Overview of this book

Table of Contents (13 chapters)

Summary


In this chapter, we went over how apps are distributed and how they prove their integrity to the system once they are installed. We demonstrated the concept of locking a device into an app with Guided Access. Inter-app (and device) communication via extensions and Continuity was also discussed along with the new complimentary privacy controls for things like keyboards. As this chapter was about the customization and controls you'd want to place on apps, we gave a brief introduction to securely distributing your own in-house apps.

Since the time the iPhone first came along, the way many people interact with apps has changed significantly. Limited methods of installation, silos for categories of data and the capabilities of apps, and the keychain concept from OS X have all come to bear on iOS' overall security. You should now have enough background on how apps function to begin to understand why the limitations are the way they are, and what to keep in mind when you are tasked with...