Secure your

Поділитися
Вставка
  • Опубліковано 30 січ 2025

КОМЕНТАРІ • 18

  • @facile-tech
    @facile-tech 11 місяців тому

    Majid trying his best to hide his sleep during the introduction round :). Really great video btw. Thank you

  • @nateg617
    @nateg617 Рік тому

    It is really cool. Congratulation guys

  • @SoulCalmingWithAzooz
    @SoulCalmingWithAzooz Рік тому +1

    I did not get it how to get the Hashes, please.
    I mean converting to Android is not working.
    how to get the Hashesfrom Flutter.

  • @kodplanet
    @kodplanet Рік тому +1

    Dear @Majid this may be irrelevant but which software are you using for these split screen recordings, editing, etc?

  • @joshuanwokoye
    @joshuanwokoye Рік тому

    Many thanks Majid

  • @nabilchebbah4046
    @nabilchebbah4046 Рік тому

    thank you very much

  • @kherldhussein
    @kherldhussein Рік тому

    Love this !!!!

  • @car-census
    @car-census Рік тому

    At some point, it is stated that the expectedPackageName should be hardcoded. What happens if we are using the same codebase for multiple clients with different Package Names and hashes ?

    • @sergiyyakymchuk1026
      @sergiyyakymchuk1026 Рік тому

      Talsec has a premium SDK (RASP+) which is recommended solution for White Label apps vendors and for SDK vendors, where there could be many packages/hashes for the same codebase

  • @thecouple2023
    @thecouple2023 5 місяців тому

    Is Watcher Email Required here or can be left blank?

    • @TalsecJaroslav
      @TalsecJaroslav 4 місяці тому

      As of freeRASP version 6.8.0 and earlier, watcher mail is *technically* required, but you can provide empty string.
      However, I do not recommend doing this, because you'll lost option to receive security reports which are vital part of freeRASP.

  • @AUP-eg9xw
    @AUP-eg9xw Рік тому

    hi @Majid, if someone tempered or reverse engineer my flutter app, then how this free_rasp plugin will detect it? as attacker will pack a new apk using my same code and that will be a entire new apk. so how my actual apk detects like someone tempered or reverse-engineered my app?

    • @TalsecJaroslav
      @TalsecJaroslav 4 місяці тому

      Every APK is signed with a unique key that is known only to you (and Google, in case of apps distributed via the Play Store). If an attacker reverse-engineers your Flutter app and repackages it (creating a new APK using your code), they would need your original signing key to sign the new APK.
      If the attacker signs the APK with a different key (which they likely will), the freeRASP plugin will detect that the app was signed with a different key than the original.

    • @AUP-eg9xw
      @AUP-eg9xw 4 місяці тому

      @@TalsecJaroslav Yes I understood. but question is, attacker will sign the APK after removing such conditions like freeRASP and then they will market it, so if someone installed the fake version, there is no checking. this is what attacker do with most of the well-known games apk.

    • @binSaed
      @binSaed 3 місяці тому

      @@AUP-eg9xw
      +1
      for me i watched the hole video for 1 hour, to find how freeRASP prevents attackers from change some dart code, like sign hash
      i also know after repackage, sign hash will change, but attacker will change it also!

    • @TalsecJaroslav
      @TalsecJaroslav Місяць тому

      ​@@AUP-eg9xw
      First and foremost, it’s important to note that removing protection is a complex process. freeRASP is designed with multiple layers of countermeasures to deter any attempts to disable it.
      Additionally, our BusinessRASP offering includes an advanced feature called AppiCrypt. This technology safeguards your APIs by requiring a cryptographic secret from the Talsec SDK. Even if an attacker manages to bypass certain protections, the app will be unable to communicate with your secure backend, effectively rendering it non-functional in most cases.

    • @TalsecJaroslav
      @TalsecJaroslav Місяць тому

      @@AUP-eg9xw
      First and foremost, bypassing or disabling protection is a challenging endeavor. freeRASP includes advanced mechanisms to detect and respond to any attempts to disable its safeguards.
      In addition, BusinessRASP provides feature called AppiCrypt, which secures the application’s API calls by requiring a unique cryptographic secret (cryptogram). Even if an attacker manages to bypass or remove RASP, the application will often remain unusable, as it won’t be able to perform network calls protected by AppiCrypt.