22.1 Introduction

In general:

Who deploys the app is responsible for security between apps, and within your app

But… it’s possible for a knowledgeable attacker to send values that are not expected…

The advice about How to secure your device by attackers is not exhaustive. We need to search for alternative solutions to the impossibility of stopping an attacker from invading your app and its content.

It is important not to underestimate combinations or substitutions of functions that would be preventable errors in chain creation.