Contents

khuong291/encryptedappstorage

> @AppStorage is built on top of UserDefaults, which is not secure storage. Which mean, you should not save your sensitive data using @AppStorage, because it’s easy for hacker to attack. Which @EncryptedAppStorage, your sensitive data will be saved in KeyChain. Once stored in Key

Usage

@EncryptedAppStorage can work with any types of value. If you assign the default value, then that value will be stored in KeyChain if it has no value there.

@EncryptedAppStorage(<#StoreKey#>)
var sensitiveString = "Sensitive String"
@EncryptedAppStorage(<#StoreKey#>)
var sensitiveInt = 100

struct MyObject: Codable {
    var name: String
}

@EncryptedAppStorage(<#StoreKey#>)
var myObject: MyObject? = nil

🛠 Compatibility

  • macOS 11.0+
  • iOS 14.0+
  • iPadOS 14.0+
  • tvOS 14.0+
  • watchOS 7.0+

⚙️ Installation

Only available with Swift Package Manager

👨‍💻 Author

Khuong – @khuong291

Package Metadata

Repository: khuong291/encryptedappstorage

Default branch: master

README: README.md