O'Reilly logo

iOS Programming Cookbook by Hossam Ghareeb

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Security and Encryption

VIn this chapter, we will cover the following topics:

  • Using Touch ID for user authentication
  • Working with Keychain
  • Encryption

Introduction

When you deal with user information, there is nothing more important than respecting the user's privacy, and ensuring that all information shared by the user is in a secure location and no one except your system can access it. Right now, we deal with many apps that know a lot or almost everything about life, such as photos, videos, notes, payments, messages, call history, and so on. Dealing with sensitive data recklessly leads to serious problems to your users, and you will be in trouble. Making everything secure is not an easy solution or a final solution. You can say that yes, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required