Summary

In this chapter, we discussed some of the security issues surrounding iBeacon deployment and ways to protect against some of those security issues. Finally, we discussed common fears of users who encounter iBeacon solutions and ways to alleviate those fears.

We've come to the end of the chapter and your initial journey into iBeacon solutions, but this is by no means the end of your journey. If you have any questions at all about the book, then I'd love to hear from you, catch me on Twitter at @craiggilchrist and I'll gladly help you out. All that remains is to wish you the best of luck with your future proximity-powered endeavors from myself and everyone involved in the book. Thank you for reading and I hope you build incredible iBeacon ...

Get Learning iBeacon now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.