# TrustDevice-iOS A lightweight library for determining device uniqueness and risk identification. Create a device identifier based on basic device information. Will remain the same after uninstalling and reinstalling or clearing app data. πͺ§Attentionπͺ§οΌThe functions of the basic version of github are relatively limited. You can visit [AWS Marketplace](https://aws.amazon.com/marketplace/pp/prodview-5fkjqqnkoajcs?sr=0-1&ref_=beagle&applicationId=AWSMPContessa) or [TrustDecision](https://trustdecision.com/solutions/device-fingerprint) to learn about our professional version. ## Quick Start ### 1. Add Dependcy TrustDecision is available through [CocoaPods](https://cocoapods.org). To install it, simply add the following line to your Podfile: ```ruby # Podfile pod 'TrustDecision', '1.5' ``` ### 2. Get DeviceInfo DeviceInfo contains device id, risk information and device details. #### Objective-C ```objective-c #import
Type | Scene | Result | TrusDevice Pro | Fingerprint | Seon | CredoLab | Sift | Shield | PerimeterX |
---|---|---|---|---|---|---|---|---|---|
Device Fingerprint Compatibility | iOS 9.0 and above, including iOS 16, etc. | Able to collect device info and generate device ID | β | β (ios12 and above) | β (ios9 and above) | β (ios11 and above) | β (ios9.2 and above) | β (ios9 and above) | β (ios11 and above) |
Device fingerprint uniqueness | Different apps (with different package names) on the same device | Device fingerprints/ID matches | β | β | β | β | β | β | β |
The same app on two unique devices (including the case of the same device model and the same system version) | Device fingerprint/ID should not match. Each device to have its own unique device fingeprint/ID | β | β | β | β | β | β | β | |
Device Fingerprint Stability | Uninstall and reinstall | Device fingerprints/ID are consistent before and after reinstallation | β | β | β | β | β | β | β |
Clear all app data | Device fingerprints/ID are consistent before and after clearing all app data | β | β | β | β | β | β | β | |
Disable all app permissions except network permissions and clear app data | Device fingerprints/ID are consistent before and after disabling all permissions | β | β | β | β | β | β | β | |
Modify the common information of the device system (brand, model, IDFA, IDFV, etc.) through the machine modification tool | Device fingerprint/ID still matches with before modification | β | β | β | β | β | β | β | |
Device system upgrade | Device fingerprints/ID are consistent before and after system upgrade | β | β | β | β | β | β | β | |
Factory reset (including iOS 14 and above, etc.) | The device fingerprints/ID are the same before and after the device is restored to factory settings | β | β | β | β | β | β | β | |
Device Fingerprint Risk Identification | Secondary packaging | Ability to identify secondary packaged unofficial apps | β | β | β | β | β | β | β |
Replay attack | Ability to identify replay attacks | β | β | β | β | β | β | β | |
Device location information has been tampered with | Ability to identify tampering of location information | β | β | β | β | β | β | - | |
No SIM card inserted | Can identify whether the device is inserted with a SIM card | β | β | β | β | β | β | β | |
The device uses an HTTP proxy | Can identify HTTP proxy risks | β | β | β | β | β | β | β | |
The device uses a VPN proxy | Can identify VPN proxy risks | β | β | β | β | β | β | β | |
Jailbreak | Ability to identify jailbreak risks | β | β | β | β | β | β | β | |
The device is an emulator | Ability to recognize emulators | β | β | β | β | β | β | β | |
The device uses the machine modification tool to modify the device parameter information | Ability to identify mainstream modification tools | β | β | β | β | β | β | β | |
The device has scripts and group control tools installed (tools that are used to control multiple devices from single terminal - device farm/device group) | Can identify mainstream scripting/group control tools | β | β | β | β | β | β | β | |
The device is equipped with an M chip | Devices capable of recognizing M-chips | β | β | β | β | β | β | - | |
The device is not logged into the iCloud account | Able to identify login iCloud account | β | β | β | β | β | β | β | |
Security and Stability | Code Protection | The device fingerprint SDK and JS have code protection mechanisms (such as VMP), which effectively resist black hat cracking attempts to manipulate code logic and falsify data | β (OLLVM, VMP) | β | β | β | β | β | β |
Downgrade | Intercepting and sending collection requests in the iOS environment can still generate device fingerprints normally | β | β | β | β | β | β | β | |
Anti packet capture | iOS has the ability to prevent packet capture | β | β | β | β | β | β | β |