Hardening iOS
Keeping it as simple as possible. iOS evolves fast. An old and new iPhone are underway for further pentesting, after which these mitigations will be updated (when we have time).
Accounts and authentication
Services and applications
- Introduction
- Audit and block the access apps have to data and devices
- Remove unwanted third party apps (UAPs)
- Block apps from accessing Bluetooth data
- Check for unknown configuration profiles
- Secure browsers that protect your privacy
- Change your browser app
- Use a secure messaging service
- Use secure email services
- Use SSH tunnels
- Use a VPN service
- Use a Tor proxy
- Change MAC address
- Edit hosts file
Operations security
Guards! Guards!