保护 iPhone 上的文件

发布于 2024-09-02 01:39:00 字数 329 浏览 5 评论 0原文

有没有办法从 iPhone 应用程序反编译二进制文件。 我越狱了我的 iPhone,并惊讶地发现其他应用程序的数据库完全开放以供复制。 因此,我导出了最重要的表并将其硬编码为代码。 我没有将表从数据库加载到数组中,而是生成代码来填充数组并仅保留最基本的数据库信息,因此关系仍然有效。 花了一段时间,但现在工作正常。

我只是想知道我是否安全,有人可以轻松反编译应用程序的二进制文件并提取数据。在 Java 中,很容易反编译 *.class 文件,尽管那是字节码,我认为 iPhone 应用程序的级别更低。

我知道 iPhone sdk 4 可以将文件标记为安全。任何人都知道这可以被越狱覆盖还是这是一个unix锁?

Is there a way to decompile the binary from an IPhone app.
I jailbroke my IPhone and was surprised to find other app's dbs wide open to be copied.
So I exported my most important table and hardcoded it into code.
Instead of loading table into array from a db I just generated code to fill the array and kept only the most basic DB info so relationships still work.
Took a while but now works fine.

I was just wondering am I safe, could someone decompile the binary for the app easily and extract the data. In Java its easy to decompile *.class files though thats bytecode where I presume iphone apps are more low level.

I know IPhone sdk 4 can mark files as secure. Anyone know can this be overridden by jailbreaks or is this an unix lock?

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(3

那小子欠揍 2024-09-09 01:39:00

如果不加密这些数据,你实际上只能受到人们缺乏动力的保护。如果有足够动力的人想要查看数据,他们就可以。即使您加密了数据,如果他们的密钥位于您的代码中或由您的代码生成,他们也可以找到该数据。

Short of encrypting that data, you are really only protected by peoples lack of motivation. If someone with enough motivation wants to look at the data, they can. Even if you encrypt the data, if they key is in, or generated by, your code they can find that too.

挽心 2024-09-09 01:39:00

说实话,苹果连一块砖都拿不到。 iPhone从一开始就几乎不断被越狱。用户(即黑客:)比开发人员对设备拥有更多的控制权。您无法真正保护设备上的内容。如果使用加密,则没有什么可以阻止攻击者获取密钥。 (他可以控制所有库,并且可以挂钩他想要的任何函数调用。)

开发人员通常会依赖

To be honest Apple couldn't secure a brick. The iPhone has been almost continuously jail-breakable seance the beginning. Users (read hackers:) have more control over the device than developers. There is no way that you can truly secure content on the device. If encryption is used, there is nothing keeping the attacker from obtaining the key. (He has control over all libraries and can hook any function call he wants.)

It is common to see developers fall back on Security Though Obscurity, and I'm not going to entertain these ideas. If there is data on the device, a hacker can and will make a copy of it.

稀香 2024-09-09 01:39:00

我越狱了我的 iPhone,然后
惊讶地发现其他应用程序的数据库范围很广
打开以进行复制。

不,这没有什么问题。它必须存储在某个地方。

所以我导出了我最重要的表
并将其硬编码为代码。

糟糕的举动。

从特权域越狱是手机中的漏洞,不是您的问题。您对此无能为力,即使加密您的数据也无法拯救您,因为手机上的所有特权代码都将能够访问加密密钥。

换句话说:

代码通常不会怀有敌意并窃取您的货物。唯一的原因是用户将错误代码下载到手机上或发生了远程攻击。

I jailbroke my IPhone and was
surprised to find other app's dbs wide
open to be copied.

No. There is nothing wrong with this. It has to be stored somewhere.

So I exported my most important table
and hardcoded it into code.

Bad move.

A jailbreak from a priviledge domain is a vulnerability in the phone and is not your problem. There is nothing you can do about that, and even encrypting your data will not save you because all privileged code on the phone will be able to access the encryption keys.

In other words:

Code will not normally be hostile and steal your goods. The only reason it would is because the user downloaded bad code onto the phone or a remote exploit took place.

~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文