[![CI Status](http://img.shields.io/travis/Andre Hoffmann/EZTamperDetection.svg?style=flat)](https://travis-ci.org/Andre Hoffmann/EZTamperDetection)
This tamper detection can be integrated into an iOS Application or Framework. It tests for common hot spots on jailbroken devices:
- an open sandbox
- filesystem abnormalities
- Application directory type
- existence of certain dynamic libraries
On a vanilla jailbroken iOS 9.0.2 device it detects filesystem abnormalities and if the Application directory is replaced by a symbolic link. Method names are rather cryptic on purpose.
To run the example project, clone the repo, and run pod install
from the Example directory first.
The example needs iOS 9.0 to compile.
EZTamperDetection is available through CocoaPods. To install it, simply add the following line to your Podfile:
pod "EZTamperDetection"
Andre Hoffmann, dev - a t - effzehn.de
EZTamperDetection is available under the MIT license. See the LICENSE file for more info.