Главная
Study mode:
on
1
Introduction
2
Lock Picking
3
Security Through obscurity
4
Navajo
5
Encryption
6
Risk Management
7
Raising the Bar
8
Bots
9
Strings
10
Tools
11
Avoid sensitive strings
12
Storing sensitive API keys
13
You cannot authenticate an app
14
Monitor your logs
15
Hide some secrets
16
Base64
17
ToolD
18
AES
19
Stronger strings
20
Random keys
21
Real strings
22
Real life obfuscation
23
When I hack programs
24
Random data
25
steganography
26
scanning for strings
27
using Charles
28
certificate pinning
29
certificate validator
30
secret knock
31
secret key
32
attack your app
33
Debugging
34
Hardening
35
Protect Data
Description:
Explore the complexities of app security in this 59-minute conference talk by Rob Napier. Delve into the nuances of "security through obscurity" and learn why it's not as simple as conventional wisdom suggests. Discover the various attacks your app may be facing unknowingly and understand the distinctions between cryptography, obfuscation, and steganography. Gain practical insights on protecting users, services, and businesses through approachable techniques. Focus on mobile development and mobile-server communication issues, with examples primarily in iOS and Swift, but applicable to Android and back-end development. Learn about lock picking, encryption, risk management, bot prevention, API key storage, certificate pinning, secret knocks, app hardening, and debugging techniques. Understand how to monitor logs, hide secrets, use stronger strings, and implement real-life obfuscation strategies to enhance your app's security posture.

Secrets and Lies: Protecting Mobile Apps Through Cryptography and Obfuscation

ChariotSolutions
Add to list
0:00 / 0:00