[Add] DebugSwift 0.3.9
[CocoaPods.git] / Specs / 9 / f / 4 / Obfuscator / 1.0.1 / Obfuscator.podspec.json
blob5ef40f4a8b626e6db6e42d34f53628bb57afe4a7
2   "name": "Obfuscator",
3   "version": "1.0.1",
4   "summary": "Secure your app by obfuscating all the hard-coded security-sensitive strings.",
5   "description": "                   Secure your app by obfuscating all the hard-coded security-sensitive strings.\n\n                   Security Sensitive strings can be:\n\n                   * REST API Credentials\n                   * OAuth Credentials\n                   * Passwords\n                   * URLs not intended to be known to the public (i.e. private backend API endpoints)\n                   * Keys & Secrets\n\n                   This library hard-codes typical NSStrings as C language strings encoded in hexadecimal.\n                   When your app needs the original unobfuscated NSStrings, it dynamically decodes it back.\n\n                   It adds an extra layer of security against prying eyes.\n\n                   This makes it harder for people with jail-broken iPhones from opening up your app's executable file and \n                   looking for strings embedded in the binary that may appear 'interesting.'\n\n                   See generally:\n                   * http://www.raywenderlich.com/46223/ios-app-security-analysis-part-2\n                   * http://www.splinter.com.au/2014/09/16/storing-secret-keys/\n\n",
6   "homepage": "https://github.com/pjebs/Obfuscator-iOS",
7   "license": {
8     "type": "MIT",
9     "file": "LICENSE"
10   },
11   "authors": {
12     "PJ Engineering and Business Solutions Pty. Ltd.": "enquiries@pjebs.com.au"
13   },
14   "platforms": {
15     "ios": "6.0"
16   },
17   "source": {
18     "git": "https://github.com/pjebs/Obfuscator-iOS.git",
19     "tag": "v1.0.1"
20   },
21   "source_files": "Obfuscator/*",
22   "requires_arc": true