Found 10 packages
A Xamarin Forms plugin to check if devices are rooted / jailbroken.
In order to use it just do the following: iOS: JailBrakeChecker.IsJailBroken(); Android: RootChecker.IsRooted();
CK.Core contains types and helpers that are used across different projects. Main types are: - NormalizedPath: Normalizes / and \ separators to /, exposes Parts and handle multiple kind of roots: / (RootedBySeparator), 'X:' or ':' (RootedByFirstPart), '//' (RootedByDoubleSeparator), or 'xx://' (RootedByURIScheme). - CKTrait: Thread safe set of (immutable) string tags that support all set operations. - DateTimeStamp: Simple DateTime with byte uniquifier. - SimpleServiceContainer: Basic IServiceProvider implementation. - HashStream and SHA1Value, SHA256Value and SHA512Value. - ISystemClock and SystemClock default implementation. - Completable & Completion: Are "futures" or "yet another promises" (based on Task/TaskCompletionSource). Offer Covariance of the completion result and optional extension points to map errors (exceptions or cancellation) to regular results. - CKBinaryReader/Writer: extend IBinaryReader/Writer with nullable support, more read/write of standard types and optional value sharing.
Stripe is a simple, developer-friendly way to accept payments online. We believe that enabling transactions on the web is a problem rooted in code, not finance, and we want to help put more websites in business.
These are the current checks/tricks we are using to give an indication of root. Java checks CheckRootManagementApps CheckPotentiallyDangerousAppss CheckRootCloakingApps CheckTestKeys checkForDangerousProps checkForBusyBoxBinary checkForSuBinary checkSuExists checkForRWSystem Native checks We call through to our native root checker to run some of it's own checks. Native checks are typically harder to cloak, so some root cloak apps just block the loading of native libraries that contain certain key words. checkForSuBinary
A library for all the data structures in C#. Every class is generic and reusable.
A lightweight .NET Android library for detecting rooted devices and enhancing application security.
Verified execution-state primitives (account/storage/receipt proofs rooted in the light client).
This library serves as a quoting data provider plugin for the Intel SGX Data Center Attestation Primitives (DCAP). Specifically, the Intel DCAP library will search out and load provider plugins, such as the Azure DCAP Client. This provider plugin is then used to fetch certain data files, such as platform certificates, TCB structures, and revocation lists. The Azure DCAP Client fetches artifacts from an Azure-internal caching service. The purpose of this cache is to ensure that all Azure hosts always have the correct data available and local within the Azure cloud. The data serviced by the Azure cache are all Intel-originating, and are rooted to Intel CAs. The cache serves simply to ensure that there are no external dependencies on Intel for workloads running on Azure infrastructure.
Domainify is a framework rooted in the principles of Domain-Driven Design (DDD). This framework empowers developers to boost the speed of development without any concerns about losing control of growing the project and being able to implement details like invariants, specifications, and how to architect the project. The rate of codes of a project that has been developed by Domainify is significantly lower. It helps developers focus on the business instead of spending time on the code and solving challenges related to the code.