
This update adds VPN detection, proxy detection, malicious app detection, and unknown application origin check on both platforms. Android-specific detections include ADB monitoring, Developer Options detection, and spoofed location checks. On iOS, we've added screenshot blocking.
In short, this release offers you more visibility into network conditions, device configurations, and environmental risks. All for you to make better-informed decisions on how your app responds to threats.
Let’s start with the detections that are now available on both Android and iOS. These focus mainly on understanding the environment your app is running in, especially when something looks off.
The new VPN detection checks whether a device is routing its network traffic through a VPN.
Using a VPN isn’t automatically bad, as plenty of people use them for privacy. But from an app protection point of view, VPNs are often used to:
This detection gives you extra context. On its own, it’s just a signal. Combined with other detections, it can help you spot activity that deserves a closer look.
Why is Proxy Detection Important For App Security? Proxy detection identifies whether the device is set up to use an HTTP, HTTPS, or SOCKS proxy.
Why does that matter? Because proxies can:
If a proxy is detected, it’s a good indication that network traffic might not be going straight from the app to your servers. That’s especially relevant for apps that care about data integrity or client-side enforcement.
How Does Malicious Application Detection Improve Device Awareness? This release adds detection for specific known malicious applications installed on the device.
Other apps on the phone can matter more than people expect. Malicious apps can:
By detecting these apps directly, you get a clearer picture of whether your app is running in a hostile environment, even if your own app hasn’t been touched.
This detection checks how the app was installed.
If an app was downloaded from an unofficial source, that raises a red flag. Apps installed outside official stores are more likely to be:
Flagging unknown origins helps identify tampered or unofficial versions of your app in the wild.
Android gives users a lot of flexibility, which is great. However, it also means there are a few extra things worth keeping an eye on.
ADB (Android Debug Bridge) is a built-in Android tool that lets a computer communicate directly with a device.
Developers rely on it, but in production environments, ADB can be used to:
Detecting active ADB usage helps highlight cases where a device might not be operating purely in the user’s hands.
This detection checks whether Developer Options are enabled on the device.
Developer Options unlock features that are useful for testing and debugging, but they also:
Enabled Developer Options don’t automatically mean malicious intent, but they do signal that the device isn’t in a default, locked-down state.
Location spoofing is more common than people think. It’s often used to:
This detection looks for signs that the device’s reported location isn’t genuine, helping protect any logic that depends on trustworthy location data.
On the iOS side, we’ve added screenshot blocking.
This lets you prevent screenshots on sensitive screens, especially useful for:
It’s a simple feature, but it can significantly reduce the risk of accidental or intentional data leakage.
This release is all about better context and better signals. Instead of relying on a single indicator, you now have more ways to understand:
If you have questions or want to dig deeper into any of these detections, contact us – zero obligation.