Late last month a Forbes article caught my attention, and likely that of millions of iPhone users worldwide. The article – Of Ma and Malware: Inside China’s iPhone Jailbreaking Industrial Complex – highlighted the country’s blatant efforts to reward hackers for jailbreaking Apple’s iPhone operating system. China actually flew hackers in from around the world to help educate their researchers on jailbreaking in an effort to boost their third-party app store industry – apps that are currently banned by Apple.
The article highlighted well-known firms, such as Alibaba, as participating in the jailbreaking efforts and subsequent third-party app marketplaces, to the detriment of Apple and other phone and app providers. The door that jailbreaking provides malware and other piracy is troubling and money changing hands for worthy hackers can reach into the millions, meaning it’s not going to stop anytime soon.
As the article mentions:
China’s third-party marketplaces have become synonymous with iOS malware and piracy, however. In 2014, the Maiyadi App Store was responsible for delivering the Wirelurker malware via 467 apps masquerading as knock-offs of big-name games, including Sims 3, Pro Evolution Soccer 2014 and Angry Birds. As many as 356,000 were infected by the malware, which sought to identify individuals downloading the apps, leading to the suggestion that Wirelurker was the work of a government body trying to uncover pirates. Again, illicit use of Enterprise Certificates helped spread the unapproved software.Our Cryptanium Code Protection is designed to prevent these jailbreaks in iOS and other platforms. Cryptanium applies integrated protection mechanisms to the entire application code at different layers. With no changes to your source code, code protection obfuscates the code base using patented obfuscation algorithms, injects hundreds of overlapping integrity checkers, and embeds platform-specific anti-debug, anti-piracy, and anti-malware code. As Cryptanium applies security features at different levels, hackers cannot easily remove applied security techniques one-by-one. In order to succeed, the entire protection must be cracked at once, which is a very difficult task when using Cryptanium.
With Cryptanium, your application becomes a self-contained fortress. You do not have to rely on any external security providers. By implementing the unique features of Cryptanium, intellectual property can be secured, business models protected, and the life cycles of applications prolonged.
- Without an effective code protection scheme, popular applications can be attacked and reverse engineered in a matter of days after release, adversely affecting revenue streams (as the article clearly shows).
- Code Protection obfuscates the code base using patented obfuscation algorithms, injects hundreds of overlapping checksums, and embeds platform-specific anti-debug and anti-piracy code.
- Hackers cannot implement a step-by-step removal of the applied security techniques. In order to succeed, the entire protection must be cracked at once, which is an extremely difficult and time consuming task.
Cryptanium code protection delivers the next level of self-defense and tamper resistance technology against jailbreaking and piracy. Why wait for bad press, angry customers and loss of revenue?