04 Dec 23

Many apps use API keys when authenticating network requests. Although there are better ways of authenticating requests like OAuth with PKCE, but it might not always be possible. One thing what we must keep in mind is that it is fairly simple to extract strings from IPA files and therefore, if we store API keys…

by chrisSt 2 years ago

24 Apr 14

11 Dec 12

I love how this web page is setup. Great way to document an API

by bbohling 13 years ago