| { |
| "name": "EZTamperDetection", |
| "version": "1.0.0", |
| "summary": "A small class to determine if it's code is exectued on a jailbroken device.", |
| "description": "This tamper detection can be integrated into an iOS Application or Framework. It tests for common hot spots on jailbroken devices:\n\nan open sandbox\nfilesystem abnormalities\nApplication directory type\nexistence of certain dynamic libraries\nOn a vanilla jailbroken iOS 9.0.2 device it detects filesystem abnormalities and if the Application directory is replaced by a symbolic link. Method names are rather cryptic on purpose.", |
| "homepage": "https://github.com/effzehn/EZTamperDetection", |
| "license": "MIT", |
| "authors": { |
| "Andre Hoffmann": "dev@effzehn.de" |
| }, |
| "source": { |
| "git": "https://github.com/effzehn/EZTamperDetection.git", |
| "tag": "1.0.0" |
| }, |
| "platforms": { |
| "ios": "8.0" |
| }, |
| "requires_arc": true, |
| "source_files": "Pod/Classes/**/*" |
| } |