Hands On Mobile API Security: Pinning Client Connectionsby@skiph
5,216 reads

Hands On Mobile API Security: Pinning Client Connections

May 25th 2017
11m
by @skiph 5,216 reads
tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

The Hands On Mobile API Security: Get Rid of Client Secrets tutorial demonstrates how to improve mobile app security by removing vulnerable API secrets from mobile apps. To enhance security, you would want to run HTTPS protocol with certificate pinning to protect against man in the middle (MitM) attacks. In this sequel, you will generate a self-signed certificate during configuration and modify the Android client to only accept connection requests from a server holding the certificate’s private key. The modifications look like this:

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coins Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Hands On Mobile API Security: Pinning Client Connections
Skip Hovsmith HackerNoon profile picture

@skiph

Skip Hovsmith


Receive Stories from @skiph

react to story with heart

RELATED STORIES

L O A D I N G
. . . comments & more!
Hackernoon hq - po box 2206, edwards, colorado 81632, usa