Specifically it limits what APIs can and can’t be used by apps and forces the use of entitlements to access features of the hardware.
Downvote if you want, but entitelements are part of the code signing process which this article is trying to avoid. And jailbroken apps already don’t have the protections you’re talking about.
It’s not uncommon for people to datamine not public API all over Apple’s frameworks and the only thing preventing the usage is App Store policies and static analysis tools.
Umm… no? The phone operating system (iOS) enforces sandboxing. You can not run anything outside the sandbox without some exploit, at which point we have a completely new discussion.
…do you know what enforces all of that?
The App store…
Specifically it limits what APIs can and can’t be used by apps and forces the use of entitlements to access features of the hardware.
Downvote if you want, but entitelements are part of the code signing process which this article is trying to avoid. And jailbroken apps already don’t have the protections you’re talking about.
It’s not uncommon for people to datamine not public API all over Apple’s frameworks and the only thing preventing the usage is App Store policies and static analysis tools.
Umm… no? The phone operating system (iOS) enforces sandboxing. You can not run anything outside the sandbox without some exploit, at which point we have a completely new discussion.