security - Prevent attacker from decompiling iOS app and getting database access -
according this post, it's possible decompile ios application.
how can prevent attacker gaining access aws dynamodb database? having access keys out in open shown on amazon developer guide doesn't seem safe.
i think use keychain store keys, feel there easy way past motivated attacker, given have app's assembly source code.
currently, connect using amazon cognito. have use connect identity id , role name. don't see stopping attacker getting values , connecting database.
for example, stops attacker decompiling facebook ios app code , deleting of users?
how can prevent attackers decompiling ios application , getting access database access keys, or @ least prevent them doing major damage, such deleting users?
based on admittedly limited experience, i'd motivated attacker always able retrieve credentials use access database regardless of executable. would, however, question why application needs have direct access database in first place.
the usual way safeguard serverside data use web service access it. app contacts web service request, service contacts db, gets data, sends back. since web service , db both hosted on server , web service needs direct access db, there no need store db access info in app. problem solved.
Comments
Post a Comment