paint-brush
Hands On Mobile API Security: Pinning Client Connectionsby@skiph
5,248 reads
5,248 reads

Hands On Mobile API Security: Pinning Client Connections

by Skip Hovsmith7mMay 25th, 2017
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

The Hands On Mobile API Security: Get Rid of Client Secrets tutorial demonstrates how to improve mobile app security by removing vulnerable API secrets from mobile apps. To enhance security, you would want to run HTTPS protocol with certificate pinning to protect against man in the middle (MitM) attacks. In this sequel, you will generate a self-signed certificate during configuration and modify the Android client to only accept connection requests from a server holding the certificate’s private key. The modifications look like this:

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coins Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Hands On Mobile API Security: Pinning Client Connections
Skip Hovsmith HackerNoon profile picture
Skip Hovsmith

Skip Hovsmith

@skiph

Developer and Advocate — Software Performance and API Security

About @skiph
LEARN MORE ABOUT @SKIPH'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Skip Hovsmith HackerNoon profile picture
Skip Hovsmith@skiph
Developer and Advocate — Software Performance and API Security

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite