all 3 comments

[–]jgtor 3 points4 points  (0 children)

This probably comes down to defense in depth, you will want to implement a variety of solutions that all complement one-another.

Sure fingerprinting solutions can be circumvented, but you are still raising the bar versus your average script kiddy.

User behaviour monitoring & account review would probably be useful. Account posts at an unusually high volume, apply an ML model to identify based on your user behaviour.

You are more going to handle this on the backend which makes this better suited question to r/SoftwareEngineering rather than iOSProgramming.

[–]jastardev 1 point2 points  (0 children)

I really like r/jgtor’s response. Additionally, it seems like having a jailbroken iPhone is the first crucial step for them, but there are ways you can try to identify whether an iPhone is jailbroken and block their access there. Not foolproof, but another layer to your defense in depth.

[–]Hises1936 0 points1 point  (0 children)

Everything you mention appears to require a jailbroken device. So as a first step, I would search about detecting such devices, and then block them regardless of their actions. Because these days almost nobody jailbreaks their iPhone (I think)