FINDING · EVALUATION
The study finds that apps distributed via Iranian third-party iOS stores frequently contain embedded third-party tracking SDKs and piracy libraries inserted during repackaging, and that cracked/modified binaries have stripped or replaced code-signing certificates with enterprise distribution certificates. The paper quantifies developer revenue loss from piracy and documents that the repackaging process introduces both surveillance and integrity risks that users are generally unaware of.
From 2026-khanlari-iranian-ios-stores — Taking a Bite Out of the Forbidden Fruit: Characterizing Third-Party Iranian iOS App Stores · §5, §6 · 2026 · arXiv preprint
Implications
- Circumvention apps distributed via Iranian third-party stores may be repackaged with added tracking SDKs or malicious modifications; consider publishing SHA-256 hashes of official binaries and in-app integrity self-checks that warn users of tampered builds.
- Enterprise certificate distribution (the primary mechanism these stores use) can be revoked by Apple; circumvention app distribution in IR should have a fallback that doesn't depend on a single enterprise certificate remaining valid.
Tags
Extracted by claude-sonnet-4-6 — review before relying.