# Introduction

## Featured AppSec Collections

<details>

<summary>Mobile and API Threat Detection &#x26; Defense (Rooting, Hooking, Reverse Engineering)</summary>

*Technical articles focused on advanced strategies to detect and defend against mobile threats, including rooting, hooking, reverse engineering, and API abuse.*

[how-to-block-screenshots-screen-recording-and-remote-access-tools-in-android-and-ios-apps](https://docs.talsec.app/appsec-articles/articles/how-to-block-screenshots-screen-recording-and-remote-access-tools-in-android-and-ios-apps "mention")

[flutter-security-101-restricting-installs-to-protect-your-app-from-unofficial-sources](https://docs.talsec.app/appsec-articles/articles/flutter-security-101-restricting-installs-to-protect-your-app-from-unofficial-sources "mention")

[emulators-in-gaming-threats-and-detections](https://docs.talsec.app/appsec-articles/articles/emulators-in-gaming-threats-and-detections "mention")

[hacking-and-protection-of-mobile-apps-and-backend-apis-or-2024-talsec-threat-modeling-exercise](https://docs.talsec.app/appsec-articles/articles/hacking-and-protection-of-mobile-apps-and-backend-apis-or-2024-talsec-threat-modeling-exercise "mention")

[detect-system-vpns-with-freerasp](https://docs.talsec.app/appsec-articles/articles/detect-system-vpns-with-freerasp "mention")

[safeguarding-your-data-in-react-native-secure-storage-solutions](https://docs.talsec.app/appsec-articles/articles/safeguarding-your-data-in-react-native-secure-storage-solutions "mention")

[obfuscation-of-mobile-apps](https://docs.talsec.app/appsec-articles/articles/obfuscation-of-mobile-apps "mention")

</details>

<details>

<summary>Talsec RASP+, AppiCrypt and freeRASP Guides and Features</summary>

*This collection highlights cutting-edge tools and resources from Talsec designed to secure mobile apps through runtime application self-protection (RASP), API integrity checks, and anti-abuse measures.*

[react-native-secure-boilerplate-2024-ignite-with-freerasp](https://docs.talsec.app/appsec-articles/articles/react-native-secure-boilerplate-2024-ignite-with-freerasp "mention")

[mobile-api-anti-abuse-protection-with-appicrypt-r-a-new-play-integrity-and-devicecheck-alternative](https://docs.talsec.app/appsec-articles/articles/mobile-api-anti-abuse-protection-with-appicrypt-r-a-new-play-integrity-and-devicecheck-alternative "mention")

[introducing-talsecs-advanced-malware-protection](https://docs.talsec.app/appsec-articles/articles/introducing-talsecs-advanced-malware-protection "mention")

[enhancing-capacitor-app-security-with-freerasp-your-shield-against-threats](https://docs.talsec.app/appsec-articles/articles/enhancing-capacitor-app-security-with-freerasp-your-shield-against-threats "mention")

[build-secure-apps-in-react-native](https://docs.talsec.app/appsec-articles/articles/build-secure-apps-in-react-native "mention")

</details>

<details>

<summary>OWASP TOP 10 for Flutter</summary>

*Series of artiles written by Majid Hajian discussing each threat of OWASP TOP 10, in context of Flutter and its security.*

[owasp-top-10-for-flutter-m1-mastering-credential-security-in-flutter](https://docs.talsec.app/appsec-articles/articles/owasp-top-10-for-flutter-m1-mastering-credential-security-in-flutter "mention")

[owasp-top-10-for-flutter-m2-inadequate-supply-chain-security-in-flutter](https://docs.talsec.app/appsec-articles/articles/owasp-top-10-for-flutter-m2-inadequate-supply-chain-security-in-flutter "mention")

[owasp-top-10-for-flutter-m3-insecure-authentication-and-authorization-in-flutter](https://docs.talsec.app/appsec-articles/articles/owasp-top-10-for-flutter-m3-insecure-authentication-and-authorization-in-flutter "mention")

[owasp-top-10-for-flutter-m4-insufficient-input-output-validation-in-flutter](https://docs.talsec.app/appsec-articles/articles/owasp-top-10-for-flutter-m4-insufficient-input-output-validation-in-flutter "mention")

[owasp-top-10-for-flutter-m5-insecure-communication-for-flutter-and-dart](https://docs.talsec.app/appsec-articles/articles/owasp-top-10-for-flutter-m5-insecure-communication-for-flutter-and-dart "mention")

[owasp-top-10-for-flutter-m6-inadequate-privacy-controls-in-flutter-and-dart](https://docs.talsec.app/appsec-articles/articles/owasp-top-10-for-flutter-m6-inadequate-privacy-controls-in-flutter-and-dart "mention")

[owasp-top-10-for-flutter-m7-insufficient-binary-protection-in-flutter-and-dart](https://docs.talsec.app/appsec-articles/articles/owasp-top-10-for-flutter-m7-insufficient-binary-protection-in-flutter-and-dart "mention")

[owasp-top-10-for-flutter-m8-security-misconfiguration-in-flutter-and-dart](https://docs.talsec.app/appsec-articles/articles/owasp-top-10-for-flutter-m8-security-misconfiguration-in-flutter-and-dart "mention")

[owasp-top-10-for-flutter-m9-insecure-data-storage-in-flutter-and-dart](https://docs.talsec.app/appsec-articles/articles/owasp-top-10-for-flutter-m9-insecure-data-storage-in-flutter-and-dart "mention")

[owasp-top-10-for-flutter-m10-insufficient-cryptography-in-flutter-and-dart](https://docs.talsec.app/appsec-articles/articles/owasp-top-10-for-flutter-m10-insufficient-cryptography-in-flutter-and-dart "mention")

</details>

<details>

<summary>Flutter Security</summary>

*At Talsec, we’re proud to lead the way as the **#1 Flutter Security SDK**, and our commitment to this growing framework runs deep. This curated collection showcases our ongoing efforts to protect Flutter apps.*

[flutter-security-101-restricting-installs-to-protect-your-app-from-unofficial-sources](https://docs.talsec.app/appsec-articles/articles/flutter-security-101-restricting-installs-to-protect-your-app-from-unofficial-sources "mention")

[user-authentication-risks-coverage-in-flutter-mobile-apps-or-talsee](https://docs.talsec.app/appsec-articles/articles/user-authentication-risks-coverage-in-flutter-mobile-apps-or-talsee "mention")

[secure-storage-what-flutter-can-do-what-flutter-could-do](https://docs.talsec.app/appsec-articles/articles/secure-storage-what-flutter-can-do-what-flutter-could-do "mention")

[flutter-plugin-attack-mechanics-and-prevention](https://docs.talsec.app/appsec-articles/articles/flutter-plugin-attack-mechanics-and-prevention "mention")

[how-to-hack-and-protect-flutter-apps-simple-and-actionable-guide-pt.-1-3](https://docs.talsec.app/appsec-articles/articles/how-to-hack-and-protect-flutter-apps-simple-and-actionable-guide-pt.-1-3 "mention")

[how-to-hack-and-protect-flutter-apps-owasp-mas-and-rasp.-pt.-2-3](https://docs.talsec.app/appsec-articles/articles/how-to-hack-and-protect-flutter-apps-owasp-mas-and-rasp.-pt.-2-3 "mention")

[how-to-hack-and-protect-flutter-apps-steal-firebase-auth-token-and-attack-the-api.-pt.-3-3](https://docs.talsec.app/appsec-articles/articles/how-to-hack-and-protect-flutter-apps-steal-firebase-auth-token-and-attack-the-api.-pt.-3-3 "mention")

[missing-hero-of-flutter-world](https://docs.talsec.app/appsec-articles/articles/missing-hero-of-flutter-world "mention")

</details>

<details>

<summary>Reports &#x26; Original Research</summary>

*In-depth reports and original research articles focused on mobile app security, fraud prevention, and API protection.*

[exclusive-research-unlocking-reliable-crash-tracking-with-plcrashreporter-for-ios-sdks](https://docs.talsec.app/appsec-articles/articles/exclusive-research-unlocking-reliable-crash-tracking-with-plcrashreporter-for-ios-sdks "mention")

[how-to-test-a-rasp-owasp-mas-rasp-techniques-not-implemented-maswe-0103](https://docs.talsec.app/appsec-articles/articles/how-to-test-a-rasp-owasp-mas-rasp-techniques-not-implemented-maswe-0103 "mention")

[flutter-cto-report-2024-flutter-app-security-trends](https://docs.talsec.app/appsec-articles/articles/flutter-cto-report-2024-flutter-app-security-trends "mention")

[fraud-proofing-an-android-app-choosing-the-best-device-id-for-promo-abuse-prevention](https://docs.talsec.app/appsec-articles/articles/fraud-proofing-an-android-app-choosing-the-best-device-id-for-promo-abuse-prevention "mention")

[protecting-your-api-from-app-impersonation-token-hijacking-guide-and-mitigation-of-jwt-theft](https://docs.talsec.app/appsec-articles/articles/protecting-your-api-from-app-impersonation-token-hijacking-guide-and-mitigation-of-jwt-theft "mention")

[5-things-john-learned-fighting-hackers-of-his-app-a-must-read-for-pms-and-cisos](https://docs.talsec.app/appsec-articles/articles/5-things-john-learned-fighting-hackers-of-his-app-a-must-read-for-pms-and-cisos "mention")

</details>

<details>

<summary>Talsec Mobile App Security Conference 2025</summary>

*Summary of talks and keynotes from Talsec Mobile App Security Conference 2025 in shortened article form with video attached as well.*

[keynote-discovering-the-power-of-ai-pentesting-with-pedro-conde-ethiack](https://docs.talsec.app/appsec-articles/articles/keynote-discovering-the-power-of-ai-pentesting-with-pedro-conde-ethiack "mention")

[keynote-red-teaming-in-practice-with-adam-zilla-haxoris](https://docs.talsec.app/appsec-articles/articles/keynote-red-teaming-in-practice-with-adam-zilla-haxoris "mention")

[keynote-raising-the-bar-with-software-protection-with-beatrice-creusillet-quarkslab](https://docs.talsec.app/appsec-articles/articles/keynote-raising-the-bar-with-software-protection-with-beatrice-creusillet-quarkslab "mention")

[keynote-20-minutes-to-banking-grade-security-with-mateusz-wojtczak-leancode](https://docs.talsec.app/appsec-articles/articles/keynote-20-minutes-to-banking-grade-security-with-mateusz-wojtczak-leancode "mention")

[keynote-communty-driven-security-as-collective-defense-with-tomas-soukal-talsec](https://docs.talsec.app/appsec-articles/articles/keynote-communty-driven-security-as-collective-defense-with-tomas-soukal-talsec "mention")

[keynote-cloudflare-for-appsec-with-anatol-nikiforov-cloudflare](https://docs.talsec.app/appsec-articles/articles/keynote-cloudflare-for-appsec-with-anatol-nikiforov-cloudflare "mention")

[keynote-fingerprinting-device-intel-and-context-with-martin-makarsky-fingerprint](https://docs.talsec.app/appsec-articles/articles/keynote-fingerprinting-device-intel-and-context-with-martin-makarsky-fingerprint "mention")

[techtalk-threshold-cryptography-with-jan-kvapil-muni](https://docs.talsec.app/appsec-articles/articles/techtalk-threshold-cryptography-with-jan-kvapil-muni "mention")

[techtalk-best-practices-for-keeping-your-app-safe-with-majid-hajian-microsoft](https://docs.talsec.app/appsec-articles/articles/techtalk-best-practices-for-keeping-your-app-safe-with-majid-hajian-microsoft "mention")

[techtalk-predictive-apps-protection-with-sergiy-yakymchuk-talsec](https://docs.talsec.app/appsec-articles/articles/techtalk-predictive-apps-protection-with-sergiy-yakymchuk-talsec "mention")

[opening-keynote-safety-security-equilibrium-with-sergiy-yakymchuk-talsec](https://docs.talsec.app/appsec-articles/articles/opening-keynote-safety-security-equilibrium-with-sergiy-yakymchuk-talsec "mention")

[tt-the-ai-impersonator-runtime-defense-against-machine-generated-deception-with-dmitri-bogatenkov](https://docs.talsec.app/appsec-articles/articles/tt-the-ai-impersonator-runtime-defense-against-machine-generated-deception-with-dmitri-bogatenkov "mention")

[panel-engineers-vs.-reverse-engineers](https://docs.talsec.app/appsec-articles/articles/panel-engineers-vs.-reverse-engineers "mention")

</details>

## Latest Articles

Articles by our team members and guest experts ([become one of them](https://docs.talsec.app/community)) that explore practical mobile security and threat defense topics for the developer community.

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="image">Cover image</th></tr></thead><tbody><tr><td>Panel: Engineers vs. Reverse Engineers</td><td><a href="articles/panel-engineers-vs.-reverse-engineers">panel-engineers-vs.-reverse-engineers</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FiFfjk9mj6IoSJpnvWdBr%2FEngineers%20vs.%20Reverse%20Engineers.png?alt=media&#x26;token=f955325d-712d-4d59-aeb2-c3709b606da6">Engineers vs. Reverse Engineers.png</a></td></tr><tr><td>The AI Impersonator: Runtime Defense Against Machine-Generated Deception with Dmitri Bogatenkov</td><td><a href="articles/tt-the-ai-impersonator-runtime-defense-against-machine-generated-deception-with-dmitri-bogatenkov">tt-the-ai-impersonator-runtime-defense-against-machine-generated-deception-with-dmitri-bogatenkov</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FXE1GspO9ueoi7r7z1sD6%2FThe%20AI%20Impersonator%20Runtime%20Defense%20Against%20Machine-Generated%20Deception%20with%20Dmitri%20Bogatenkov%20(XYB).png?alt=media&#x26;token=d5ed2776-9771-49b7-ba96-9903b9d625f4">The AI Impersonator Runtime Defense Against Machine-Generated Deception with Dmitri Bogatenkov (XYB).png</a></td></tr><tr><td>How to Stop Bots Without CAPTCHA</td><td><a href="articles/how-to-stop-bots-without-captcha">how-to-stop-bots-without-captcha</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FaEziSuy81zatRqO5WgoT%2FHow%20to%20Stop%20Bots%20Without%20CAPTCHA.png?alt=media&#x26;token=27bcb142-a530-422c-ba1d-874f8c263000">How to Stop Bots Without CAPTCHA.png</a></td></tr><tr><td>Opening Keynote: Safety/Security Equilibrium with Sergiy Yakymchuk (Talsec)</td><td><a href="articles/opening-keynote-safety-security-equilibrium-with-sergiy-yakymchuk-talsec">opening-keynote-safety-security-equilibrium-with-sergiy-yakymchuk-talsec</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2Fy6MWaY6ispthhNed5DU5%2FSafetySecurity%20Equilibrium%20with%20Sergiy%20Yakymchuk%20(Talsec).png?alt=media&#x26;token=99b01619-faf9-4eda-bde1-48ee85732eff">SafetySecurity Equilibrium with Sergiy Yakymchuk (Talsec).png</a></td></tr><tr><td>TechTalk: Predictive Apps Protection with Sergiy Yakymchuk (Talsec)</td><td><a href="articles/techtalk-predictive-apps-protection-with-sergiy-yakymchuk-talsec">techtalk-predictive-apps-protection-with-sergiy-yakymchuk-talsec</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FFlDjYCcv78hgU9uNlCko%2FBest%20Practices%20for%20Keeping%20Your%20App%20Safe%20with%20Majid%20Hajian%20(4).png?alt=media&#x26;token=032b8e27-f272-4fc0-ae97-e08601691c5f">Best Practices for Keeping Your App Safe with Majid Hajian (4).png</a></td></tr><tr><td>TechTalk: Best Practices for Keeping Your App Safe with Majid Hajian (Microsoft)</td><td><a href="articles/techtalk-best-practices-for-keeping-your-app-safe-with-majid-hajian-microsoft">techtalk-best-practices-for-keeping-your-app-safe-with-majid-hajian-microsoft</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FkedV2XxHOA9afKKGZ5jL%2FBest%20Practices%20for%20Keeping%20Your%20App%20Safe%20with%20Majid%20Hajian%20(3).png?alt=media&#x26;token=70fb331a-7314-48f4-9625-2e3b65ef294d">Best Practices for Keeping Your App Safe with Majid Hajian (3).png</a></td></tr><tr><td>OWASP Top 10 For Flutter – M10: Insufficient Cryptography in Flutter &#x26; Dart</td><td><a href="articles/owasp-top-10-for-flutter-m10-insufficient-cryptography-in-flutter-and-dart">owasp-top-10-for-flutter-m10-insufficient-cryptography-in-flutter-and-dart</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FivF8V9F8tKDhCCOiNOzv%2FOWASP_M10.png?alt=media&#x26;token=ef61b0ac-525c-4b31-97c3-208b7988325e">OWASP_M10.png</a></td></tr><tr><td>Android Malware Detection SDK for Your App: Detect Risky &#x26; Suspicious Apps and Known Malware</td><td><a href="articles/android-malware-detection-sdk-for-your-app-detect-risky-and-suspicious-apps-and-known-malware">android-malware-detection-sdk-for-your-app-detect-risky-and-suspicious-apps-and-known-malware</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FZ9BZZrmARTbDX66Tq6nm%2Fmalware%20det.png?alt=media&#x26;token=7e030c12-c56e-4236-9147-8d46e66a43df">malware det.png</a></td></tr><tr><td>OWASP Top 10 For Flutter – M9: Insecure Data Storage in Flutter &#x26; Dart</td><td><a href="articles/owasp-top-10-for-flutter-m9-insecure-data-storage-in-flutter-and-dart">owasp-top-10-for-flutter-m9-insecure-data-storage-in-flutter-and-dart</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FuFCg95KfvA5jqoerZrIC%2FOWASP_M9.png?alt=media&#x26;token=efdb0d74-161e-4c0b-bf02-32398b8e1d57">OWASP_M9.png</a></td></tr><tr><td>OWASP Top 10 For Flutter – M8: Security Misconfiguration in Flutter &#x26; Dart</td><td><a href="articles/owasp-top-10-for-flutter-m8-security-misconfiguration-in-flutter-and-dart">owasp-top-10-for-flutter-m8-security-misconfiguration-in-flutter-and-dart</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FdloCn5lzw96ASkp3M7h6%2FOWASP_M8.png?alt=media&#x26;token=24d97e4d-dcd0-438d-b289-ce6edcfce8b2">OWASP_M8.png</a></td></tr><tr><td>OWASP Top 10 For Flutter – M7: Insufficient Binary Protection in Flutter &#x26; Dart</td><td></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FwdgptWoOjjrXoh4YXLEw%2FOWASP_M7.png?alt=media&#x26;token=cc1c33fb-4a9a-4400-91a9-0e56cf150c63">OWASP_M7.png</a></td></tr><tr><td>Talsec RASP+ and AppiCrypt for Apple TV Apps</td><td><a href="articles/talsec-rasp+-and-appicrypt-for-apple-tv-apps">talsec-rasp+-and-appicrypt-for-apple-tv-apps</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FFTWthcNIQjdcroBEcRpT%2FTalsec%20RASP%2B%20and%20AppiCrypt%20for%20Apple%20TV%20Apps.png?alt=media&#x26;token=fe1107e8-ecdb-4f14-a000-e33c796cdaf9">Talsec RASP+ and AppiCrypt for Apple TV Apps.png</a></td></tr><tr><td>TechTalk: Threshold Cryptography with Jan Kvapil (MUNI)</td><td><a href="articles/techtalk-threshold-cryptography-with-jan-kvapil-muni">techtalk-threshold-cryptography-with-jan-kvapil-muni</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FOkJXSACETV94XQRzDpvo%2FThreshold%20Cryptography%20with%20Jan%20Kvapil%20(MUNI).png?alt=media&#x26;token=672a29d7-e885-43f3-91cd-c4007d38ea78">Threshold Cryptography with Jan Kvapil (MUNI).png</a></td></tr><tr><td>Keynote: Fingerprinting, Device Intel &#x26; Context with Martin Makarský (Fingerprint)</td><td><a href="articles/keynote-fingerprinting-device-intel-and-context-with-martin-makarsky-fingerprint">keynote-fingerprinting-device-intel-and-context-with-martin-makarsky-fingerprint</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FCLBbY6BUMcJnU0IVQobb%2FFingerprinting%2C%20Device%20Intel%20%26%20Context%20with%20Martin%20Makarsky%CC%81%20(Fingerprint).png?alt=media&#x26;token=6c94dd35-f278-415f-bacb-081867ba1aed">Fingerprinting, Device Intel &#x26; Context with Martin Makarský (Fingerprint).png</a></td></tr></tbody></table>

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th data-hidden data-card-cover data-type="image">Cover image</th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td>How To Detect Video Injection for KYC</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2Fi405IShUKVlMFw0Ndhhr%2FHow%20To%20Detect%20Video%20Injection%20for%20KYC.png?alt=media&#x26;token=fbe0e5eb-0b11-407d-b4dc-2410a13470b1">How To Detect Video Injection for KYC.png</a></td><td><a href="articles/how-to-detect-video-injection-for-kyc">how-to-detect-video-injection-for-kyc</a></td></tr><tr><td>Keynote: Cloudflare for AppSec with Anatol Nikiforov (Cloudflare)</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FLp9Ra6KY7fgUo8unp7s3%2FKeynote%20Cloudflare%20for%20AppSec%20with%20Anatol%20Nikiforov%20(Cloudflare).png?alt=media&#x26;token=cfd1db7c-f6cd-4f4a-9676-677ef04e6e50">Keynote Cloudflare for AppSec with Anatol Nikiforov (Cloudflare).png</a></td><td><a href="articles/keynote-cloudflare-for-appsec-with-anatol-nikiforov-cloudflare">keynote-cloudflare-for-appsec-with-anatol-nikiforov-cloudflare</a></td></tr><tr><td>Keynote: Communty-Driven Security as Collective Defense with Tomáš Soukal (Talsec)</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FU1qbmO6GnvhMEmaDAwgN%2FKeynote%20Communty-Driven%20Security%20as%20Collective%20Defense%20with%20Toma%CC%81s%CC%8C%20Soukal%20(Talsec).png?alt=media&#x26;token=7831ed00-1a18-4cea-a722-2ea793928dab">Keynote Communty-Driven Security as Collective Defense with Tomáš Soukal (Talsec).png</a></td><td><a href="articles/keynote-communty-driven-security-as-collective-defense-with-tomas-soukal-talsec">keynote-communty-driven-security-as-collective-defense-with-tomas-soukal-talsec</a></td></tr><tr><td>Keynote: 20 Minutes to Banking-Grade Security with Mateusz Wojtczak (LeanCode)</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FFnagFK2DrOJkl2NwxNPy%2Fleancode.png?alt=media&#x26;token=b3ecf698-b7ac-4a29-b7b9-eef5c4b06171">leancode.png</a></td><td><a href="articles/keynote-20-minutes-to-banking-grade-security-with-mateusz-wojtczak-leancode">keynote-20-minutes-to-banking-grade-security-with-mateusz-wojtczak-leancode</a></td></tr><tr><td>Keynote: Raising the Bar with Software Protection with Béatrice Creusillet (Quarkslab)</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2Fs4VckdUmq3eT2BSGwC3F%2FKeynote%20Raising%20the%20Bar%20with%20Software%20Protection%20with%20Be%CC%81atrice%20Creusillet%20(Quarkslab).png?alt=media&#x26;token=2eead34b-6020-45a3-b5fc-0404e86fbd4d">Keynote Raising the Bar with Software Protection with Béatrice Creusillet (Quarkslab).png</a></td><td><a href="articles/keynote-raising-the-bar-with-software-protection-with-beatrice-creusillet-quarkslab">keynote-raising-the-bar-with-software-protection-with-beatrice-creusillet-quarkslab</a></td></tr><tr><td>Keynote: Red Teaming in Practice with Adam Žilla (Haxoris)</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FZlJZBDBTJDwooXkEZkfX%2FKeynote%20Red%20Teaming%20in%20Practice%20with%20Adam%20Z%CC%8Cilla%20(Haxoris).png?alt=media&#x26;token=7556d4c3-39a5-4c37-a773-0d594e252f1d">Keynote Red Teaming in Practice with Adam Žilla (Haxoris).png</a></td><td><a href="articles/keynote-red-teaming-in-practice-with-adam-zilla-haxoris">keynote-red-teaming-in-practice-with-adam-zilla-haxoris</a></td></tr><tr><td>Keynote: Discovering the Power of AI Pentesting with Pedro Conde (Ethiack)</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FuRN2qaqZOHCsksm1j4nF%2Fethihack.png?alt=media&#x26;token=3018a40a-27f6-47e3-94c5-6023e27e6169">ethihack.png</a></td><td><a href="articles/keynote-discovering-the-power-of-ai-pentesting-with-pedro-conde-ethiack">keynote-discovering-the-power-of-ai-pentesting-with-pedro-conde-ethiack</a></td></tr><tr><td>How to Detect Jailbreak using Capacitor</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FNOuC9nnsLSqSdym2aXrU%2Fhow%20to%20detect%20jailbreak%20on%20capacitor.png?alt=media&#x26;token=8ee7ecd3-b607-4674-b142-72bad9dc4514">how to detect jailbreak on capacitor.png</a></td><td><a href="articles/how-to-detect-jailbreak-on-capacitor">how-to-detect-jailbreak-on-capacitor</a></td></tr><tr><td>How to Detect Hooking using Capacitor</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2Fv7vvrAmwxd3MAIRLMMO6%2FHow%20to%20Detect%20Hooking%20using%20Capacitor.png?alt=media&#x26;token=7a51d48a-f0fc-41e1-9aad-2a7ee1a542ef">How to Detect Hooking using Capacitor.png</a></td><td><a href="articles/how-to-detect-hooking-frida-on-capacitor">how-to-detect-hooking-frida-on-capacitor</a></td></tr><tr><td>freeRASP for Kotlin Multiplatform Guide</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FgNAx3wyivu6FJWPTLnde%2FKMP.png?alt=media&#x26;token=1489f4d7-70d1-4eed-a437-88fddd521562">KMP.png</a></td><td><a href="articles/freerasp-for-kotlin-multiplaform-guide">freerasp-for-kotlin-multiplaform-guide</a></td></tr><tr><td>Achieving Cloudflare Outage Resilience using AppiCryptWeb</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FWoOMHSfckJopHu22n2As%2FAchieving%20Cloudflare%20Outage%20Resilience%20using%20AppiCryptWeb.png?alt=media&#x26;token=fce52f2e-e903-46aa-8dac-c57866815f13">Achieving Cloudflare Outage Resilience using AppiCryptWeb.png</a></td><td><a href="articles/achieving-cloudflare-outage-resilience-using-appicryptweb">achieving-cloudflare-outage-resilience-using-appicryptweb</a></td></tr><tr><td>How to Detect Root on React Native</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FtZZtzkFfFBmJrugIoCgm%2Fshizuku.png?alt=media&#x26;token=8fb2b8d5-13a2-476c-92dc-bb4c9276d00a">shizuku.png</a></td><td><a href="articles/how-to-detect-root-on-react-native">how-to-detect-root-on-react-native</a></td></tr><tr><td>How to Detect Jailbreak on React Native</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FA0LV3Pj2Iy7zkw3W55wJ%2Fhow%20to%20detect%20jailbreak%20on%20flutter.png?alt=media&#x26;token=95a3dc55-c3eb-4b3c-81a0-81695fde436b">how to detect jailbreak on flutter.png</a></td><td><a href="articles/how-to-detect-jailbreak-on-react-native">how-to-detect-jailbreak-on-react-native</a></td></tr><tr><td>How to Prevent Magisk Root Hiding and Security Bypass</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FY5fSIOLnOwmmvu0h9JiK%2FHow%20to%20Prevent%20Magisk%20Root%20Hiding%20and%20Security%20Bypass.png?alt=media&#x26;token=dd9e3c61-5bb2-48b8-882b-5ed754beebb2">How to Prevent Magisk Root Hiding and Security Bypass.png</a></td><td><a href="articles/how-to-prevent-magisk-root-hiding-and-security-bypass">how-to-prevent-magisk-root-hiding-and-security-bypass</a></td></tr><tr><td>How to Detect Hooking (Frida) on React Native</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FlTYfZ9KRDE4xYtm1Opav%2FHow%20to%20Detect%20Hooking%20using%20React%20Native.png?alt=media&#x26;token=baffc25d-fc2f-400b-bfd6-879892d3707c">How to Detect Hooking using React Native.png</a></td><td><a href="articles/how-to-detect-hooking-frida-on-react-native">how-to-detect-hooking-frida-on-react-native</a></td></tr><tr><td>How to Detect a Weak Wi-Fi: Guide to In-App Network Security Checks</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FBqcZMdx5MVkC0rdXt4fy%2FHow%20to%20Detect%20a%20Weak%20Wi-Fi.png?alt=media&#x26;token=2de1c69b-a8e3-440d-af06-9f9edcf12a87">How to Detect a Weak Wi-Fi.png</a></td><td><a href="articles/how-to-detect-a-weak-wi-fi-guide-to-in-app-network-security-checks">how-to-detect-a-weak-wi-fi-guide-to-in-app-network-security-checks</a></td></tr><tr><td>Future-Proofing for the Data-Driven Ecosystem: Securing Your Application and Data APIs</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FBYrADHXTra4W0j0PSVdF%2FCrash%20Tracking.png?alt=media&#x26;token=d65c208c-bf8d-497d-9eb6-bc2b4098d834">Crash Tracking.png</a></td><td><a href="articles/future-proofing-for-the-data-driven-ecosystem-securing-your-application-and-data-apis">future-proofing-for-the-data-driven-ecosystem-securing-your-application-and-data-apis</a></td></tr><tr><td>freeRASP for Unreal Engine: Secure Your Revenue</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FlGKLl0hmHz4YyoOIjxhc%2FfreeRASP%20for%20Unreal%20Engine.png?alt=media&#x26;token=db18e345-efe4-47b5-aa10-c29ae1594c9c">freeRASP for Unreal Engine.png</a></td><td><a href="articles/freerasp-for-unreal-engine-secure-your-revenue">freerasp-for-unreal-engine-secure-your-revenue</a></td></tr></tbody></table>

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th data-hidden data-card-cover data-type="image">Cover image</th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td>How to Detect Screen Capture &#x26; Recording using Kotlin</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FyAT1n50eGFdxXcuVgF4r%2Fportal.png?alt=media&#x26;token=27703c4e-aa10-414a-a99f-8d0c2b49913b">portal.png</a></td><td><a href="articles/how-to-detect-screen-capture-and-recording-using-kotlin">how-to-detect-screen-capture-and-recording-using-kotlin</a></td></tr><tr><td>How to Detect Developer Mode on Android using Kotlin</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2Fr4FpJndYFIR1iIbpg0tG%2Fportal%20(1).png?alt=media&#x26;token=09f5c769-33b2-4d26-8aa1-d4eafe0652d2">portal (1).png</a></td><td><a href="articles/how-to-detect-developer-mode-on-android-using-kotlin">how-to-detect-developer-mode-on-android-using-kotlin</a></td></tr><tr><td>How to Detect App Tampering &#x26; Repackaging using Kotlin</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FJ5gXxPzgpzZ8UGdyzyZa%2Fportal%20(2).png?alt=media&#x26;token=07a2b68f-9f1c-4f55-a805-ce000abeec49">portal (2).png</a></td><td><a href="articles/how-to-detect-app-tampering-and-repackaging-using-kotlin">how-to-detect-app-tampering-and-repackaging-using-kotlin</a></td></tr><tr><td>How to Detect Jailbreak on Flutter</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FXRWz0UwRnDWSXdZxjZT7%2Fflutter-jailbreak-postcard.png?alt=media&#x26;token=adfffa26-f006-415a-a067-63e8dff63612">flutter-jailbreak-postcard.png</a></td><td><a href="articles/how-to-detect-jailbreak-on-flutter">how-to-detect-jailbreak-on-flutter</a></td></tr><tr><td>How to Detect Root on Flutter</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FiNF9sB7FynBabGtyp8fR%2Fflutter-root-postcard.png?alt=media&#x26;token=f72c7940-618b-4a53-af53-1ff2b473e352">flutter-root-postcard.png</a></td><td><a href="articles/how-to-detect-root-on-flutter">how-to-detect-root-on-flutter</a></td></tr><tr><td>How to Detect Hooking (Frida) on Flutter</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FJb8cPj9JrwCYkjPhjn95%2Fflutter-hooking-postcard.png?alt=media&#x26;token=32e2596c-b344-4447-8bd0-942fadc0b5bc">flutter-hooking-postcard.png</a></td><td><a href="articles/how-to-detect-hooking-frida-on-flutter">how-to-detect-hooking-frida-on-flutter</a></td></tr></tbody></table>

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th data-hidden data-card-cover data-type="image">Cover image</th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td>How Secure Are Flutter Apps?</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FCstQWdrkKIt39mATGDOE%2Fhsafa.png?alt=media&#x26;token=982dbf6e-f3c9-44fa-aaa5-409dcb0c4a7e">hsafa.png</a></td><td><a href="articles/how-secure-are-flutter-apps">how-secure-are-flutter-apps</a></td></tr><tr><td>How to Detect Emulator in Kotlin</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FsfmESggFGyF8u6MG7aVf%2FEmulator%20Detection.png?alt=media&#x26;token=d70dfdf0-9302-4933-a0c8-3fdd297af6a9">Emulator Detection.png</a></td><td><a href="articles/how-to-detect-emulator-in-kotlin">how-to-detect-emulator-in-kotlin</a></td></tr></tbody></table>

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th data-hidden data-card-cover data-type="image">Cover image</th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td>How to Detect Root using Kotlin</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FlxInCavTY19vezBVBZA5%2Fshizuku.png?alt=media&#x26;token=00812937-425f-49fd-b2a7-8602db80272a">shizuku.png</a></td><td><a href="articles/how-to-detect-root-using-kotlin">how-to-detect-root-using-kotlin</a></td></tr><tr><td>How to Detect Jailbreak using Swift</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2Ftsa1HoXPtZKGKLBHxmnN%2Fimage.png?alt=media&#x26;token=3ac4fd2e-3094-425b-9d3a-6c7b65eca120">image.png</a></td><td><a href="articles/how-to-detect-jailbreak-using-swift">how-to-detect-jailbreak-using-swift</a></td></tr><tr><td>How to Detect Hooking (Frida) using Kotlin</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2F3N2mUGKUpmiK99er8BUN%2Fhow%20to%20detect%20hooking%20using%20kotlin.png?alt=media&#x26;token=67efcfed-3a12-4ac1-b415-d638f5051155">how to detect hooking using kotlin.png</a></td><td><a href="articles/how-to-detect-hooking-frida-using-kotlin">how-to-detect-hooking-frida-using-kotlin</a></td></tr><tr><td>How to Detect Hooking (Frida) using Swift</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FAgm52P1Xu6WMV8LKBR2o%2Fimage.png?alt=media&#x26;token=8988bf99-c1c1-4d2a-8036-914099cc6560">image.png</a></td><td><a href="articles/how-to-detect-hooking-frida-using-swift">how-to-detect-hooking-frida-using-swift</a></td></tr><tr><td>How to Detect VPN using Swift</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FEn75BPw6cq2egYqBTZen%2Fimage.png?alt=media&#x26;token=7e83407c-6c0f-4d17-9384-c3ab4173dd72">image.png</a></td><td><a href="articles/how-to-detect-vpn-using-swift">how-to-detect-vpn-using-swift</a></td></tr><tr><td>How to Detect VPN using Kotlin</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2F5CGL6HwPeFmeYnv9DOb3%2Fhow%20to%20detect%20vpn%20using%20kotlin.png?alt=media&#x26;token=3872a9b1-6580-4f62-8663-4455950ce4f0">how to detect vpn using kotlin.png</a></td><td><a href="articles/how-to-detect-vpn-using-kotlin">how-to-detect-vpn-using-kotlin</a></td></tr></tbody></table>

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th data-hidden data-card-cover data-type="image">Cover image</th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td>AppiCrypt Against Time Spoofing: From Free Trial Abuse to License Fraud and Audit Log Corruption</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FRzWsmPEmRIJPgP5qQxui%2Fportal.png?alt=media&#x26;token=1aa58a33-4799-467f-adc4-138c58417b37">portal.png</a></td><td><a href="articles/appicrypt-against-time-spoofing-from-free-trial-abuse-to-license-fraud-and-audit-log-corruption">appicrypt-against-time-spoofing-from-free-trial-abuse-to-license-fraud-and-audit-log-corruption</a></td></tr><tr><td>Preventing Piracy and Cheating in Games: A Guide to Countering GameGuardian with Talsec</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FmVQVzoZZnDNlEw9dm0Jq%2Fgameguardian.png?alt=media&#x26;token=bff9725e-51f1-4ad0-8c9c-24f73a99714c">gameguardian.png</a></td><td><a href="articles/preventing-piracy-and-cheating-in-games-a-guide-to-countering-gameguardian-with-talsec">preventing-piracy-and-cheating-in-games-a-guide-to-countering-gameguardian-with-talsec</a></td></tr></tbody></table>

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td>iOS Keychain vs. Android Keystore</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FPkbfLVa3ErpOUGYsncQr%2Fhow%20to%20detect%20root.png?alt=media&#x26;token=e74c3ecb-e9b0-4109-9f77-431046e6801b">how to detect root.png</a></td><td><a href="articles/ios-keychain-vs.-android-keystore">ios-keychain-vs.-android-keystore</a></td></tr><tr><td>Introducing Multi-Instancing Detection for freeRASP</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FTpCgeM7A9ds77NoxsT6w%2Fintroducing%20multi-instance.png?alt=media&#x26;token=7f907c49-192d-440f-9a9c-35b85510ecc8">introducing multi-instance.png</a></td><td><a href="articles/introducing-multi-instancing-detection-for-freerasp">introducing-multi-instancing-detection-for-freerasp</a></td></tr></tbody></table>

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td>Introducing the Talsec Portal: A New Way to Monitor Your App — Try It Now!</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FinSRK3kJHi5xM49YBJD0%2Fportal.png?alt=media&#x26;token=6ed6af1b-37a0-4656-811b-92a0c5a04cac">portal.png</a></td><td><a href="articles/introducing-the-talsec-portal-a-new-way-to-monitor-your-app-try-it-now">introducing-the-talsec-portal-a-new-way-to-monitor-your-app-try-it-now</a></td></tr><tr><td>How to Achieve Root-Like Control Without Rooting: Shizuku's Perils &#x26; Talsec's Root Detection</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FbFJtwoYcef6GoZ975rqp%2Fshizuku.png?alt=media&#x26;token=eabcee93-1205-4fc9-a80f-208de6a73020">shizuku.png</a></td><td><a href="articles/how-to-achieve-root-like-control-without-rooting-shizukus-perils-and-talsecs-root-detection">how-to-achieve-root-like-control-without-rooting-shizukus-perils-and-talsecs-root-detection</a></td></tr></tbody></table>

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td>freeRASP for Unity Guide [new!]</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FVxtINDMrADKcxSWFuILS%2FfreeRASP%20for%20Unity%20Android.png?alt=media&#x26;token=f4159e08-a54e-4a71-89d2-7da95bfc44dd">freeRASP for Unity Android.png</a></td><td><a href="articles/freerasp-for-unity-guide">freerasp-for-unity-guide</a></td></tr><tr><td>ApkSignatureKiller: How it Works and How Talsec Protects Your Apps</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FuepVg1w9nzCpULCshu0N%2Fapksignaturekiller.png?alt=media&#x26;token=972ce523-c466-4d6f-b4dc-4e6093f410c3">apksignaturekiller.png</a></td><td><a href="articles/apksignaturekiller-how-it-works-and-how-talsec-protects-your-apps">apksignaturekiller-how-it-works-and-how-talsec-protects-your-apps</a></td></tr><tr><td>AI Device Risk Summary Demo | Threat Protection | Risk Scoring | Malware Detection | Android &#x26; iOS</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FdiqCI4px2TBC6oKxUoBa%2Fm6%20(3).png?alt=media&#x26;token=488c4d36-a076-48ae-9821-7a152db5fd89">m6 (3).png</a></td><td><a href="articles/ai-device-risk-summary-demo-or-threat-protection-or-risk-scoring-or-malware-detection-or-android-and">ai-device-risk-summary-demo-or-threat-protection-or-risk-scoring-or-malware-detection-or-android-and</a></td></tr><tr><td>Podcast: iOS Keychain vs Android Keystore</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FfnQhD2IlHuosdmG7JBsA%2FFrida%20Detection.png?alt=media&#x26;token=83e87aeb-47a9-4a9b-bdef-d15ee95f1bd2">Frida Detection.png</a></td><td><a href="articles/podcast-ios-keychain-vs-android-keystore">podcast-ios-keychain-vs-android-keystore</a></td></tr></tbody></table>

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-card-target data-type="content-ref"></th></tr></thead><tbody><tr><td>Obfuscation of Mobile Apps</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2Fdx9O5NY68ZQJe7lW05xk%2FObfuscation%20of%20Mobile%20Apps.png?alt=media&#x26;token=8e43223d-65fe-4a63-9259-e392d4588cfb">Obfuscation of Mobile Apps.png</a></td><td><a href="articles/obfuscation-of-mobile-apps">obfuscation-of-mobile-apps</a></td></tr><tr><td>OWASP Top 10 For Flutter – M6: Inadequate Privacy Controls in Flutter &#x26; Dart</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FaYzMA1r8TA6agQFDtdbg%2Fm6.png?alt=media&#x26;token=38cfeced-976c-4d1c-a507-45af74b77bfc">m6.png</a></td><td><a href="articles/owasp-top-10-for-flutter-m6-inadequate-privacy-controls-in-flutter-and-dart">owasp-top-10-for-flutter-m6-inadequate-privacy-controls-in-flutter-and-dart</a></td></tr><tr><td>Simple Root Detection: Implementation and verification</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FtdrwU4Ufy7k5bT97MulZ%2Fsecure%20storage%20flutter.png?alt=media&#x26;token=ee582a7d-28b2-4d6d-8ecf-04d0137b85d9">secure storage flutter.png</a></td><td><a href="articles/simple-root-detection-implementation-and-verification">simple-root-detection-implementation-and-verification</a></td></tr><tr><td>Flutter - M5: Insecure Communication for Flutter and Dart</td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FNDqzlljqQ7f5EIbXckdK%2FOWASP%20M5.png?alt=media&#x26;token=b93f0869-9595-422a-aad4-6c1e61f82549">OWASP M5.png</a></td><td><a href="articles/owasp-top-10-for-flutter-m5-insecure-communication-for-flutter-and-dart">owasp-top-10-for-flutter-m5-insecure-communication-for-flutter-and-dart</a></td></tr></tbody></table>

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td>OWASP Top 10 For Flutter – M4: Insufficient Input/Output Validation in Flutter</td><td></td><td></td><td><a href="articles/owasp-top-10-for-flutter-m4-insufficient-input-output-validation-in-flutter">owasp-top-10-for-flutter-m4-insufficient-input-output-validation-in-flutter</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FeH3lz1a0T8qRStZPDDq2%2FRoot%20Detection%20Basics%20(1).png?alt=media&#x26;token=79d8eeee-f1ee-415e-a9ff-1d11a7e73b04">Root Detection Basics (1).png</a></td></tr><tr><td>OWASP Top 10 For Flutter – M3: Insecure Authentication and Authorization in Flutter</td><td></td><td></td><td><a href="articles/owasp-top-10-for-flutter-m3-insecure-authentication-and-authorization-in-flutter">owasp-top-10-for-flutter-m3-insecure-authentication-and-authorization-in-flutter</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FwECTBxhAWIErtDpuCo5H%2FOWASP_M2%20(1).png?alt=media&#x26;token=34992f67-fd54-48ff-bdf5-5a3286a785fc">OWASP_M2 (1).png</a></td></tr><tr><td>OWASP Top 10 For Flutter – M2: Inadequate Supply Chain Security in Flutter</td><td></td><td></td><td><a href="articles/owasp-top-10-for-flutter-m2-inadequate-supply-chain-security-in-flutter">owasp-top-10-for-flutter-m2-inadequate-supply-chain-security-in-flutter</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FrnxHkwAVk2ArjipdzcLA%2FOWASP_M2.png?alt=media&#x26;token=78041bbe-58c2-4369-8862-b14c64aa1bb2">OWASP_M2.png</a></td></tr><tr><td>OWASP Top 10 For Flutter - M1: Mastering Credential Security in Flutter</td><td></td><td></td><td><a href="articles/owasp-top-10-for-flutter-m1-mastering-credential-security-in-flutter">owasp-top-10-for-flutter-m1-mastering-credential-security-in-flutter</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FLDcqs7w08tW0atVB2AyN%2FFrida%20Detection%20(1).png?alt=media&#x26;token=87dbdb3a-ec54-4fe4-962d-c0e16cdb4ed6">Frida Detection (1).png</a></td></tr><tr><td>🚀A Developer’s Guide to Implement End-to-End Encryption in Mobile Apps 🛡️</td><td></td><td></td><td><a href="articles/a-developers-guide-to-implement-end-to-end-encryption-in-mobile-apps">a-developers-guide-to-implement-end-to-end-encryption-in-mobile-apps</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FxkXqubj1wkRUiiAVjSaD%2FBlock%20screen%20capture.png?alt=media&#x26;token=dd15f416-64ab-4817-8c16-b5f2e93ec54f">Block screen capture.png</a></td></tr><tr><td>Flutter Security 101: Restricting Installs to Protect Your App from Unofficial Sources</td><td></td><td></td><td><a href="articles/flutter-security-101-restricting-installs-to-protect-your-app-from-unofficial-sources">flutter-security-101-restricting-installs-to-protect-your-app-from-unofficial-sources</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2F4XXWG0LppzhIvp3jN76S%2FRestrict%20installs.png?alt=media&#x26;token=86cbcf2c-17f9-49f4-a3eb-bdfec0ea5a91">Restrict installs.png</a></td></tr><tr><td>Learn how to implement the Secure Storage in Flutter and understand storage restrictions.</td><td></td><td></td><td><a href="articles/how-to-implement-secure-storage-in-flutter">how-to-implement-secure-storage-in-flutter</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2Fx3gvzPLZTeBuWmLWSueY%2FUser%20Authentication%20(2).png?alt=media&#x26;token=0f89f818-1e56-4e20-9004-e0f42b36a756">User Authentication (2).png</a></td></tr><tr><td>Dive into our full guide as Himesh Panchal walks you through creating a robust and secure authentication flow!</td><td></td><td></td><td><a href="articles/user-authentication-risks-coverage-in-flutter-mobile-apps-or-talsee">user-authentication-risks-coverage-in-flutter-mobile-apps-or-talsee</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FifICdqjxOshYJh07Y0FR%2FUser%20Authentication.png?alt=media&#x26;token=f0930a94-bb43-46bc-9348-b3b47bf9716e">User Authentication.png</a></td></tr></tbody></table>

<table data-card-size="large" data-view="cards"><thead><tr><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th><th data-hidden data-type="rating" data-max="5"></th></tr></thead><tbody><tr><td>Introduction: Root Detection Basics</td><td><a href="https://docs.talsec.app/glossary/root-detection">https://docs.talsec.app/glossary/root-detection</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FAEC5Y6ar1LCWw1ST49rN%2FRoot%20Detection%20Basics.png?alt=media&#x26;token=74c24779-e027-4394-b28d-06f44e180e34">Root Detection Basics.png</a></td><td>null</td></tr><tr><td>OWASP Top 10 For Flutter – M2: Inadequate Supply Chain Security in Flutter</td><td><a href="articles/owasp-top-10-for-flutter-m2-inadequate-supply-chain-security-in-flutter">owasp-top-10-for-flutter-m2-inadequate-supply-chain-security-in-flutter</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FrnxHkwAVk2ArjipdzcLA%2FOWASP_M2.png?alt=media&#x26;token=78041bbe-58c2-4369-8862-b14c64aa1bb2">OWASP_M2.png</a></td><td>null</td></tr><tr><td>Hook, Hack, Defend: Frida's Impact on Mobile Security &#x26; How to Fight Back</td><td><a href="articles/hook-hack-defend-fridas-impact-on-mobile-security-and-how-to-fight-back">hook-hack-defend-fridas-impact-on-mobile-security-and-how-to-fight-back</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FlyxAUIVDpDYJSdtKNMMq%2FFrida%20Detection.png?alt=media&#x26;token=10f96cf3-81d7-40d2-b88e-2d735092654d">Frida Detection.png</a></td><td>null</td></tr><tr><td>Emulators in Gaming: Threats and Detections</td><td><a href="articles/emulators-in-gaming-threats-and-detections">emulators-in-gaming-threats-and-detections</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2F9tGSe1VR5qPH0gZMNVtP%2FEmulator%20Detection.png?alt=media&#x26;token=e91d7527-8b2d-46de-99be-4083b124108d">Emulator Detection.png</a></td><td>null</td></tr><tr><td>Exclusive Research: Unlocking Reliable Crash Tracking with PLCrashReporter for iOS SDKs</td><td><a href="articles/exclusive-research-unlocking-reliable-crash-tracking-with-plcrashreporter-for-ios-sdks">exclusive-research-unlocking-reliable-crash-tracking-with-plcrashreporter-for-ios-sdks</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FKnHraBk9VqtVeaLpk48l%2FCrash%20Tracking.png?alt=media&#x26;token=3f93b0d4-eed7-4453-b4e4-735d2651dea4">Crash Tracking.png</a></td><td>null</td></tr><tr><td>How to Block Screenshots, Screen Recording, and Remote Access Tools in Android and iOS Apps</td><td><a href="articles/how-to-block-screenshots-screen-recording-and-remote-access-tools-in-android-and-ios-apps">how-to-block-screenshots-screen-recording-and-remote-access-tools-in-android-and-ios-apps</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FVo3F07kKjx32t24WY0R7%2FRestrict%20installs%20(1).png?alt=media&#x26;token=abfd018d-93f5-47f4-88d9-6c41a1f99d80">Restrict installs (1).png</a></td><td>null</td></tr><tr><td>How do you test a RASP? This guide will walk you through the entire process of RASP evaluation. It is written for penetration testers and RASP integrators.</td><td><a href="articles/how-to-test-a-rasp-owasp-mas-rasp-techniques-not-implemented-maswe-0103">how-to-test-a-rasp-owasp-mas-rasp-techniques-not-implemented-maswe-0103</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FhWIBLt1eE0g07ixJdURM%2FHow%20to%20test%20a%20RASP.png?alt=media&#x26;token=a392769b-5534-43c6-b915-4d6848a2f307">How to test a RASP.png</a></td><td>null</td></tr><tr><td>Fact about the origin of the Talsec name</td><td><a href="articles/fact-about-the-origin-of-the-talsec-name">fact-about-the-origin-of-the-talsec-name</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FdDT6RGyqI0Zctv9ZLt1D%2F1_DrdlVmFYV7Z9xq8j6b0OIA.webp?alt=media&#x26;token=6a70a6af-9d1a-4ddd-94d6-f012c2bde7dd">1_DrdlVmFYV7Z9xq8j6b0OIA.webp</a></td><td>null</td></tr><tr><td>React Native Secure Boilerplate 2024: Ignite with freeRASP</td><td><a href="articles/react-native-secure-boilerplate-2024-ignite-with-freerasp">react-native-secure-boilerplate-2024-ignite-with-freerasp</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FBWYLqBQoOHMqjqixOGqm%2Fignite%20%2B%20freerasp%20boilerplate.png?alt=media&#x26;token=80c098b6-78c2-4bc3-9afa-751c68a2c7de">ignite + freerasp boilerplate.png</a></td><td>null</td></tr><tr><td>Hacking and protection of Mobile Apps and backend APIs | 2024 Talsec Threat Modeling Exercise</td><td><a href="articles/hacking-and-protection-of-mobile-apps-and-backend-apis-or-2024-talsec-threat-modeling-exercise">hacking-and-protection-of-mobile-apps-and-backend-apis-or-2024-talsec-threat-modeling-exercise</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FfZshR2VoEpB8HLWysAMT%2FPostcard%203.png?alt=media&#x26;token=4c59072b-1b05-4f83-9eb7-c44379292669">Postcard 3.png</a></td><td>null</td></tr><tr><td>Flutter CTO Report 2024: Flutter App Security Trends</td><td><a href="articles/flutter-cto-report-2024-flutter-app-security-trends">flutter-cto-report-2024-flutter-app-security-trends</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FandZHazUOVCk5RVCvOhV%2FPostcard%202.png?alt=media&#x26;token=9af1007d-de7f-4f25-ae5d-9997555c4d37">Postcard 2.png</a></td><td>null</td></tr><tr><td>Mobile API Anti-abuse Protection with AppiCrypt®: A New Play Integrity and DeviceCheck Alternative</td><td><a href="articles/mobile-api-anti-abuse-protection-with-appicrypt-r-a-new-play-integrity-and-devicecheck-alternative">mobile-api-anti-abuse-protection-with-appicrypt-r-a-new-play-integrity-and-devicecheck-alternative</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FcQRWkE1TqxYpHmKnLNgl%2Fimage.png?alt=media&#x26;token=bc9cff80-b645-4d81-bab9-cdb6e39d0cc5">image.png</a></td><td>5</td></tr><tr><td>Detect system VPNs with freeRASP</td><td><a href="articles/detect-system-vpns-with-freerasp">detect-system-vpns-with-freerasp</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FJDEYLmY2gXbSzPh1fePR%2Fimage.png?alt=media&#x26;token=ff189e5d-fcba-49a3-8bcc-d1b7e7be217d">image.png</a></td><td>null</td></tr><tr><td>Introducing Talsec’s advanced malware protection!</td><td><a href="articles/introducing-talsecs-advanced-malware-protection">introducing-talsecs-advanced-malware-protection</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FWiMnUPIRgFzvrbyJJzcP%2Fimage.png?alt=media&#x26;token=76eabb2c-2786-46bb-9ec1-e180ce1eaa6f">image.png</a></td><td>null</td></tr><tr><td>Fraud-Proofing an Android App: Choosing the Best Device ID for Promo Abuse Prevention</td><td><a href="articles/fraud-proofing-an-android-app-choosing-the-best-device-id-for-promo-abuse-prevention">fraud-proofing-an-android-app-choosing-the-best-device-id-for-promo-abuse-prevention</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FJrNXXYkrh2vSfnMDjU86%2Fimage.png?alt=media&#x26;token=8b655c08-8494-4b1c-9636-40b34aeb183d">image.png</a></td><td>null</td></tr><tr><td>Enhancing Capacitor App Security with freeRASP: Your Shield Against Threats 🛡️</td><td><a href="articles/enhancing-capacitor-app-security-with-freerasp-your-shield-against-threats">enhancing-capacitor-app-security-with-freerasp-your-shield-against-threats</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2F4RmPYAW7PvRwNaNSRzyH%2Fimage.png?alt=media&#x26;token=c99d3aca-aa9a-49ff-9a20-6f2a34365716">image.png</a></td><td>null</td></tr><tr><td>Safeguarding Your Data in React Native: Secure Storage Solutions</td><td><a href="articles/safeguarding-your-data-in-react-native-secure-storage-solutions">safeguarding-your-data-in-react-native-secure-storage-solutions</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FPD8hTUM733Tql4OADB83%2Fimage.png?alt=media&#x26;token=db1d355b-efed-4b36-982e-dcad20ba6ba1">image.png</a></td><td>null</td></tr><tr><td>Secure Storage: What Flutter can do, what Flutter could do</td><td><a href="articles/secure-storage-what-flutter-can-do-what-flutter-could-do">secure-storage-what-flutter-can-do-what-flutter-could-do</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2F3nhaxpaXoFMKHmNM5JKB%2Fimage.png?alt=media&#x26;token=3d44e07a-218b-4862-8027-b81af1ec1694">image.png</a></td><td>null</td></tr><tr><td>🔒 Flutter Plugin Attack: Mechanics and Prevention</td><td><a href="articles/flutter-plugin-attack-mechanics-and-prevention">flutter-plugin-attack-mechanics-and-prevention</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2Fv56ewgrrkvAHXv2QE9kc%2Fimage.png?alt=media&#x26;token=de783894-6fb4-4f70-a470-e0be74063914">image.png</a></td><td>null</td></tr><tr><td>Protecting Your API from App Impersonation: Token Hijacking Guide and Mitigation of JWT Theft</td><td><a href="articles/protecting-your-api-from-app-impersonation-token-hijacking-guide-and-mitigation-of-jwt-theft">protecting-your-api-from-app-impersonation-token-hijacking-guide-and-mitigation-of-jwt-theft</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FX1bVzfAHldjsE4KR3yH2%2Fimage.png?alt=media&#x26;token=99a0113e-475c-40d2-9ce3-39fd48aa3af4">image.png</a></td><td>null</td></tr><tr><td>Build secure apps in React Native</td><td><a href="articles/build-secure-apps-in-react-native">build-secure-apps-in-react-native</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2F4r18mekOQp5e7DX8vuoN%2Fimage.png?alt=media&#x26;token=13d4938a-041b-4760-8940-86ebac64772a">image.png</a></td><td>null</td></tr><tr><td>How to Hack &#x26; Protect Flutter Apps — Simple and Actionable Guide (Pt. 1/3)</td><td><a href="articles/how-to-hack-and-protect-flutter-apps-simple-and-actionable-guide-pt.-1-3">how-to-hack-and-protect-flutter-apps-simple-and-actionable-guide-pt.-1-3</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FmV8DsubZrpIG6pTmtZio%2Fimage.png?alt=media&#x26;token=abfc502a-9e11-46d0-bbb5-e1b451445017">image.png</a></td><td>null</td></tr><tr><td>How to Hack &#x26; Protect Flutter Apps — OWASP MAS and RASP. Use them and your project will cut the mustard! (Pt. 2/3)</td><td><a href="articles/how-to-hack-and-protect-flutter-apps-owasp-mas-and-rasp.-pt.-2-3">how-to-hack-and-protect-flutter-apps-owasp-mas-and-rasp.-pt.-2-3</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FzNYRhCipyvwwhtmzRtnU%2Fimage.png?alt=media&#x26;token=8660701b-6476-488a-843c-1c4333cc2278">image.png</a></td><td>null</td></tr><tr><td>How to Hack &#x26; Protect Flutter Apps — Steal Firebase Auth token and attack the API. (Pt. 3/3)</td><td><a href="articles/how-to-hack-and-protect-flutter-apps-steal-firebase-auth-token-and-attack-the-api.-pt.-3-3">how-to-hack-and-protect-flutter-apps-steal-firebase-auth-token-and-attack-the-api.-pt.-3-3</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FmV8DsubZrpIG6pTmtZio%2Fimage.png?alt=media&#x26;token=abfc502a-9e11-46d0-bbb5-e1b451445017">image.png</a></td><td>null</td></tr><tr><td>freeRASP meets Cordova</td><td><a href="articles/freerasp-meets-cordova">freerasp-meets-cordova</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2F8eirnEZJcuGFfrwlehXz%2Fimage.png?alt=media&#x26;token=f8413e5e-430a-426d-92d0-4977f8870e4c">image.png</a></td><td>null</td></tr><tr><td>Philosophizing security in a mobile-first world</td><td><a href="articles/philosophizing-security-in-a-mobile-first-world">philosophizing-security-in-a-mobile-first-world</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FenJZUFAcejls0aa8OVbL%2Fimage.png?alt=media&#x26;token=92867b92-39c7-4a48-a006-eb15f32b03fa">image.png</a></td><td>null</td></tr><tr><td>5 Things John Learned Fighting Hackers of His App — A must-read for PM’s and CISO’s</td><td><a href="articles/5-things-john-learned-fighting-hackers-of-his-app-a-must-read-for-pms-and-cisos">5-things-john-learned-fighting-hackers-of-his-app-a-must-read-for-pms-and-cisos</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FO0hI2GmfWDKp3JJyq769%2Fimage.png?alt=media&#x26;token=50ffd123-939d-4154-9b23-3bb96f13558a">image.png</a></td><td>null</td></tr><tr><td>Missing Hero of Flutter World</td><td><a href="articles/missing-hero-of-flutter-world">missing-hero-of-flutter-world</a></td><td><a href="https://1548930415-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNjTFXsqCLQ3RU2oA2uHC%2Fuploads%2FhhiNacI1yGcUXsnshZxM%2Fimage.png?alt=media&#x26;token=03d42972-99b6-485b-810d-10600ae1c035">image.png</a></td><td>null</td></tr></tbody></table>
