// Comparison
iOS Application Security vs Real-World Cryptography: Which Should You Read?
Two cybersecurity books on AppSec, compared honestly: who each is for, what each does best, and which to read first.
The Definitive Guide for Hackers and Developers
David Thiel
David Thiel on attacking and defending iOS apps: the platform sandbox, IPC surfaces, keychain semantics, transport security, and the patterns that introduce real bugs.
David Wong's hands-on tour of the cryptographic primitives, protocols and pitfalls that show up in actual production systems, with deliberate attention to TLS, Noise, modern AEAD, and post-quantum.
Read this if
Skip this if
Key takeaways
- Most iOS app vulnerabilities are at the app layer, not the platform layer; the book's framing aligns with what real pentests actually find.
- Keychain misuse and insecure storage are still the dominant findings on real engagements; the book's chapter on them is the practical core.
- Frida and Objection have largely replaced the older runtime-introspection tooling described here; the workflow translates, the tools have moved on.
- Most crypto vulnerabilities are misuse, not broken primitives; Wong's framing of "what to use, what to avoid" is the cleanest in print.
- TLS 1.3, Noise, and Signal-style protocols compose primitives in patterns engineers should recognise on sight, this book teaches the patterns.
- Post-quantum cryptography is no longer optional reading; the book introduces the lattice and hash-based constructions you'll be deploying within a few years.
How they compare
We rate Real-World Cryptography higher (5/5 against 3/5 for iOS Application Security). For most readers, that means Real-World Cryptography is the primary pick and iOS Application Security is a useful follow-up.
Both books target intermediate-level readers, so the choice is about topic, not difficulty.
iOS Application Security and Real-World Cryptography both cover AppSec, so reading them in sequence reinforces the same material from different angles.
Keep reading
iOS Application Security
→ Alternatives to iOS Application Security→ What to read after iOS Application SecurityReal-World Cryptography
→ Alternatives to Real-World Cryptography→ What to read after Real-World Cryptography