InLevel Up CodingbyJacob BartlettHow I Stole Your ChatGPT API KeysSecurity fundamentals for the front-endFeb 176Feb 176
vixentaelZero Knowledge Architectures for Mobile ApplicationsThis is a small handout doc following my talk “Zero Knowledge Architecture for mobile applications”, which I gave at several conferences…Dec 28, 20171Dec 28, 20171
vixentaelHow to start learning cryptography 🔑—this is what people ask me often 😊May 19, 20184May 19, 20184
InKeregebyYeskendir SalgaraSwift Concepts: Everything starts with DNS — Secure DNS with SwiftThis article explores DNS attacks and ways to counter these attacks using DNSSEC, DDR, and client authentication to make DNS authenticated…Jun 7, 2024Jun 7, 2024
Shubham BakshiSecuring iOS App: Part 1The Defense Guide That Even Siri Finds AmusingJan 24, 20241Jan 24, 20241
Dimo HamdySecure your IPA (iOS/iPad)Disclaimer: This article for learning purposes. I’m not responsible for any misuse of the techniques.Mar 21, 20241Mar 21, 20241
Ali PourhadiiOS App Security — 1After doing more research about security for iOS apps. I decided to dig deeply into each thing that may affect an iOS app security. So I…Oct 5, 2018Oct 5, 2018
Neelam SoniSSL Bypassing without using Jailbroken iOS Device and BurpsuitMobile app security plays a pivotal role in the design and development process, with the potential to define an app’s success or failure…Aug 20, 20231Aug 20, 20231
Abdul KarimAPI Key Security in iOS: Master On-Demand Protection StrategiesTo initiate the process, generate a tag with prefetching capabilities. Apple utilizes tags for identifying on-demand resources.Dec 6, 20233Dec 6, 20233
InBetter ProgrammingbyDave PoirieriOS Mobile App Security TipsI’ve been working in the software industry for well over twenty years touching all levels of security requirementsOct 16, 20232Oct 16, 20232