4 "summary": "Secure your app by obfuscating all the hard-coded security-sensitive strings.",
5 "description": " Secure your app by obfuscating all the hard-coded security-sensitive strings.\n\n Security Sensitive strings can be:\n\n * REST API Credentials\n * OAuth Credentials\n * Passwords\n * URLs not intended to be known to the public (i.e. private backend API endpoints)\n * Keys & Secrets\n\n This library hard-codes typical NSStrings as C language strings encoded in hexadecimal.\n When your app needs the original unobfuscated NSStrings, it dynamically decodes it back.\n\n It adds an extra layer of security against prying eyes.\n\n This makes it harder for people with jail-broken iPhones from opening up your app's executable file and \n looking for strings embedded in the binary that may appear 'interesting.'\n\n See generally:\n * http://www.raywenderlich.com/46223/ios-app-security-analysis-part-2\n * http://www.splinter.com.au/2014/09/16/storing-secret-keys/\n\n This library (v2+) can now be bridged over to Swift.\n\n",
6 "homepage": "https://github.com/pjebs/Obfuscator-iOS",
12 "PJ Engineering and Business Solutions Pty. Ltd.": "enquiries@pjebs.com.au"
18 "git": "https://github.com/pjebs/Obfuscator-iOS.git",
21 "source_files": "Obfuscator/*",