2 "name": "EZTamperDetection",
4 "summary": "A small class to determine if it's code is exectued on a jailbroken device.",
5 "description": "This tamper detection can be integrated into an iOS Application or Framework. It tests for common hot spots on jailbroken devices:\n\nan open sandbox\nfilesystem abnormalities\nApplication directory type\nexistence of certain dynamic libraries\nOn a vanilla jailbroken iOS 9.0.2 device it detects filesystem abnormalities and if the Application directory is replaced by a symbolic link. Method names are rather cryptic on purpose.",
6 "homepage": "https://github.com/effzehn/EZTamperDetection",
9 "Andre Hoffmann": "dev@effzehn.de"
12 "git": "https://github.com/effzehn/EZTamperDetection.git",
19 "source_files": "Pod/Classes/**/*"