Detecting Jailbroken device by creating a file in restricted path.

Hello,


I was wondering if detecting Jailbroken device by trying to create a file outside of the sandbox will cause a AppStore review rejection?

See example:

https://github.com/OWASP/owasp-mstg/blob/master/Document/0x06j-Testing-Resiliency-Against-Reverse-Engineering.md#checking-file-permissions

In that example developer is trying to create a file in "/private/" directory which is a restricted one.

Is that allowed and compatible with the AppStore review?

a) No one here can promise what will/won't be accepted/rejected...only app review knows

b) 'restricted' only has one meaning inside Apple's ecosystem...and not open for nuance.

c) Attempting to detect j'brkd device is typically a waste of time...if there were a sound/reliable method, it would be well known/accepted/used. It is not.

Detecting Jailbroken device by creating a file in restricted path.
 
 
Q