{"id":32083,"date":"2019-11-29T19:11:27","date_gmt":"2019-11-29T19:11:27","guid":{"rendered":"http:\/\/2a8a54a5-7e71-4780-8ce0-05c5a7c327a9"},"modified":"2019-11-29T19:11:27","modified_gmt":"2019-11-29T19:11:27","slug":"ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\/","title":{"rendered":"iOS apps could really benefit from the newly proposed Security.plist standard"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2019\/11\/29\/392abcb5-a9b6-4e68-9b74-b26634019b4f\/aa6657dfb160052de8118d7256f1ea5b\/securityplist.png\" class alt=\"securityplist.png\"><\/span><span class=\"credit\">Image: Ivan Rodriguez<\/span> <\/p>\n<p>Earlier this month, security researcher Ivan Rodriguez proposed a new security standard for iOS apps, which he named Security.plist.<\/p>\n<p>The idea is simple. App makers would create a property list file (<a href=\"https:\/\/developer.apple.com\/library\/archive\/documentation\/General\/Reference\/InfoPlistKeyReference\/Articles\/AboutInformationPropertyListFiles.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">plist<\/a>) named <a href=\"https:\/\/ivrodriguez.com\/introducing-security-plist\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">security.plist<\/a> that they would embed inside the root of their iOS apps.<\/p>\n<p>The file would contain all the basic contact details for reporting a security flaw to the app&#8217;s creator. Security researchers analyzing an app would have an easy way to get in contact with the app&#8217;s creators.<\/p>\n<h3>Inspired by security.txt and its great success<\/h3>\n<p>Rodriguez said the idea for Security.plist came from Security.txt, a similar standard for websites, that was <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/security-txt-standard-proposed-similar-to-robots-txt\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">proposed in late 2017<\/a>.<\/p>\n<p>Security.txt is currently going through an official standardization process at the Internet Engineering Task Force (IETF), but it has been widely adopted already, and companies like <a href=\"https:\/\/www.google.com\/.well-known\/security.txt\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Google<\/a>, <a href=\"https:\/\/github.com\/.well-known\/security.txt\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">GitHub<\/a>, <a href=\"https:\/\/www.linkedin.com\/.well-known\/security.txt\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">LinkedIn<\/a>, and <a href=\"https:\/\/www.facebook.com\/.well-known\/security.txt\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Facebook<\/a>, all have a security.txt file hosted on their sites, so bug hunters can get in touch with their respective security teams.<\/p>\n<p>Rodriguez, who is an amateur bug hunter in iOS apps, said he decided to propose a similar thing for iOS apps because getting in touch with an app&#8217;s dev or security team has been a problem in the past.<\/p>\n<p>&#8220;I spend most of my free time poking mobile applications which has lead me to find many vulnerabilities and I have yet to find one that has an easy way to find the correct channel to responsibly disclose these issues,&#8221;Rodriguez told <em>ZDNet<\/em> in an email this week.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>&#8220;More often than not, I have to write an email to a generic info@company.com or fill out a form on the company.com\/contact website. Most of these channels are handled by people in marketing or sales, who might have no idea how to respond, what to do or even to identify if it&#8217;s a real problem,&#8221; the researcher said.<\/p>\n<p>He argues that this would be much easier if the appropriate contacts would be listed in a plist file hosted in the app&#8217;s root.<\/p>\n<h3>No plans to reach out to Apple, yet<\/h3>\n<p>For now, Rodriguez has only put forward the idea. He wants to see how app makers feel about the idea.<\/p>\n<p>&#8220;So far, I&#8217;ve gotten great reactions but might be because most of the people I follow or follow me are pro &#8216;application security&#8217;,&#8221; Rodriguez told <em>ZDNet<\/em>. &#8220;It might be a bit too early to tell, but I really hope either security.plist or any other way to deploy contact information on mobile apps catches on.&#8221;<\/p>\n<p>The security researcher has not yet reached out to Apple, the only entity that could make security.txt mandatory for all iOS apps.<\/p>\n<p>&#8220;I think it&#8217;s too early,&#8221; Rodriguez said. &#8220;Even though Apple does a great job when it comes to security practices, mandatory security asks are hard to enforce, <a href=\"https:\/\/www.zdnet.com\/article\/two-thirds-of-ios-apps-disable-ats-an-ios-security-feature\/\" target=\"_blank\" rel=\"noopener noreferrer\">as we&#8217;ve seen with App Transport Security (ATS)<\/a>.&#8221;<\/p>\n<h3>A website to help iOS app makers get started<\/h3>\n<p>To help move things along, Rodriguez published <a href=\"https:\/\/securityplist.ivrodriguez.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">a website for security.plist<\/a> where app makers can generate a basic file to include inside their apps.<\/p>\n<p>&#8220;I hope mobile developers see security.plist as an initial step to work closely with the security community,&#8221; Rodriguez said.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security.plist was inspired by the already-existing and highly popular security.txt standard.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32084,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-32083","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>iOS apps could really benefit from the newly proposed Security.plist standard 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"iOS apps could really benefit from the newly proposed Security.plist standard 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-29T19:11:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1040\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"iOS apps could really benefit from the newly proposed Security.plist standard\",\"datePublished\":\"2019-11-29T19:11:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\\\/\"},\"wordCount\":560,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\\\/\",\"name\":\"iOS apps could really benefit from the newly proposed Security.plist standard 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard.png\",\"datePublished\":\"2019-11-29T19:11:27+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard.png\",\"width\":1040,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"iOS apps could really benefit from the newly proposed Security.plist standard\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"iOS apps could really benefit from the newly proposed Security.plist standard 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\/","og_locale":"en_US","og_type":"article","og_title":"iOS apps could really benefit from the newly proposed Security.plist standard 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-11-29T19:11:27+00:00","og_image":[{"width":1040,"height":510,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"iOS apps could really benefit from the newly proposed Security.plist standard","datePublished":"2019-11-29T19:11:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\/"},"wordCount":560,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\/","url":"https:\/\/www.threatshub.org\/blog\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\/","name":"iOS apps could really benefit from the newly proposed Security.plist standard 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard.png","datePublished":"2019-11-29T19:11:27+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard.png","width":1040,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ios-apps-could-really-benefit-from-the-newly-proposed-security-plist-standard\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"iOS apps could really benefit from the newly proposed Security.plist standard"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32083","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32083"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32083\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32084"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32083"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32083"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}