Carlijn
A Deeper Dive into the Application Security and Continuous Testing Integration
Integrating Security and Testing The integration of Digital.ai Application Security with our automated testing solution, Continuous Testing, provides customers with the ability to perform automatic performance, functionality, and accessibility testing on secure (hardened) applications. This document explains the benefits of this integration and explains how the integration avoids introducing new threat vectors. The Challenge: Testing Hardened Apps Before this integration it was impossible to put hardened apps – whether they were hardened by Digital.ai or by a competing app hardening product -- into any test harnesses or debugger regardless of what type of testing solution was used. That meant [...]
Your app is live. Here’s how to get it to $10K MRR
Most apps fail at monetization, not product Your onboarding and paywall placement matter more than your feature set ASO is free traffic you're probably ignoring Paid acquisition only makes sense once you know your LTV Ship fast, test everything, optimize the funnel Getting your app to $10K MRR isn't a product problem. Most developers who stall out after launch already have a working app — sometimes a genuinely good one. The problem is everything that happens after the user downloads it: the onboarding flow that loses people before they see the paywall, the pricing that undervalues the product, the [...]
Bypassing the Key Attestation API with Remote Devices
If you are a frequent reader or a Guardsquare customer, you probably have realized by now the difficulty of detecting in deterministic ways when a device has potentially gone rogue. These can include when a user manipulates a device with the goal of gaining additional privileges by modifying the operating system’s or the app’s runtime (although this doesn’t always imply a bad intent), or when a piece of malware infects the device with goals like accessing user and app data through exploits and rootkits. Many times, heuristics are used as a way to gain knowledge as to how “compromised” [...]

























