In the Secret Swift project you’ve learned about two important security techniques in iOS: biometric authentication and the keychain. Both of these in theory add some sort of security, but only if you use them correctly:
UserDefaults, it can be read out by bypassing the app.
But even with both of those two combined, is our data truly secure? As Gene Spafford once said, “the online truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.”
That doesn’t mean you shouldn’t try. As you’ve seen, Apple gives us a variety of tools we can use to keep our user data safe, and it’s worth using them all as best as we can.
Today you should work through the wrap up chapter for project 28, complete its review, then work through all three of its challenges.
In this project you learned two crucial techniques for keeping user data safe – make sure you tell others about your progress!
Need help? Tweet me @twostraws!
SPONSORED Catch bugs as soon as they happen and know exactly why a crash occurred. Instabug's SDK grabs all the logs they need to fix bugs, crashes and performance issues in minutes instead of days. Get screenshots, device details, network logs, repro steps, and tons of other critical insights needed to resolve issues and prioritize product backlogs straight from your dashboard. It only takes a minute to integrate!
Link copied to your pasteboard.