Share Continue reading on Medium » Continue reading on Medium » Read More Hacking on Medium #hacking Post navigation Mastering iOS Pentesting: Part 4 — Data Storage: What Your App Leaves Behind Dirty Pipe Was Bad. Copy Fail Was Worse. Dirty Frag Might Be The Real Warning