iOS Hacker's Handbook

Discussion in 'iOS 5 and earlier' started by munkery, Nov 27, 2011.

  1. munkery macrumors 68020

    munkery

    Joined:
    Dec 18, 2006
  2. PNutts macrumors 601

    PNutts

    Joined:
    Jul 24, 2008
    Location:
    Pacific Northwest, US
    #2
    To be fair, the description talks about mitigating and foiling attacks (not exploiting them), but potato / potahto. :D

    It will be an interesting read. Thanks for the link.
     

Share This Page