- A general strategy for confirming that an SSL-based application performs appropriate certificate validation
- How to recognize and examine trust manager implementations within a compiled Android APK
- What types of applications are most at-risk
- Tactics to minimize exposure to 802.11 protocol design flaws, which enable man-in-the-middle attacks
The allegation by the researcher that iOS contains a "backdoor" permitting third parties to potentially gain access to large amount of users' personal data, provoked Apple to give a strong response.