- 28 Oct 2024
- 2 Minutes to read
- DarkLight
Version 6.6.1 (August 2024)
- Updated on 28 Oct 2024
- 2 Minutes to read
- DarkLight
Supported platform versions
iOS 12.0 – iOS/iPadOS 17
With the end of support for iOS 9.0, support for 32-bit architectures also ended.
Shielding Tool:
Windows 10: 64-bit Java 17
Mac OSX (10.15+)
The Shielding Tool requires a macOS system to sign applications.
Ubuntu Linux 20.04 LTS or 22.04
Xcode 12 and later. We recommend using the latest Xcode version.
iOS platform updates
App Shielding version 6.6.1 is compatible with iOS/iPadOS 18 Beta 5.
As of March 1, 2024, App Shielding for iOS version 4.3.8.69424 and earlier are no longer supported. For more information, refer to the OneSpan Customer Portal at https://cp.onespan.com/ or the OneSpan Mobile Portal.
Deprecations
Platform minimum supported version
The minimum supported version is iOS 12. App Shielding no longer supports iOS 11.
Xcode
As of Xcode 14, Apple has deprecated bitcode.
As of App Shielding version 6.0.0, the Shielding Tool no longer supports bitcode-based code obfuscation!
Deprecated API
As of App Shielding version 6.5.0, the ShieldCallback API has been deprecated and will be removed in a future version. This API has been replaced with the new PRMShieldEventManager and PRMShieldEventDelegate protocols that have been integrated into the ShieldSDK callback APIs.
See also the New features and other updates section of the Release Notes for version 6.5.0. For more information about the integration, see Configure callbacks on iOS.
Removal of deprecated configuration option
The runtimeLibraryInjectionPreventionMode configuration option, deprecated as of App Shielding version 6.0.0 will be removed from in a future release ofApp Shielding.
Fixes and other changes
TestFlight certificate renewed by Apple
Description: Apple has changed its TestFlight certificate. The current certificate expires on 31 August 2024. As a result of the App Shielding repackaging protection, new shielded builds uploaded to TestFlight are exiting on startup.
When an app is uploaded to TestFlight, Apple re-signs the app with their TestFlight certificate. The App Shielding repackaging check looks at the certificate with which the application has been signed, and if it is not a trusted certificate, the app is exited (Exit On Repackaging). By default, App Shielding trusts the TestFlight and AppStore certificates, as well as any certificates specified in the App Shielding configuration via the Application Signer Certificate option. Because Apple changed its TestFlight certificate, App Shielding does not trust it by default.
Status: This issue has been fixed. The new TestFlight certificate has been added to the list of certificates that App Shielding trusts by default.
SHIOS-2789: Fixed unexpected termination with Unity-based apps
Description: An unexpected termination occurred with Unity-based apps.
Status: This issue has been fixed.
SHIOS-2992: Improved jailbreak detection
Description: The jailbreak detection for Dopamine jailbreaks has been improved.
Known limitations
The limitations described here have not yet been solved for the current Mobile Application Shielding version. Possible workarounds are described where available.
External screen block
Blocking external screens (e.g. AirPlay) is currently not working for apps that use UISceneDelegate in iOS 13 and later.