ITG GLOBAL SCREENING

Blog post image
By Admin May 8, 2026

Filtering on iOS Requires Skill: Enhance Data Accuracy by Filtering via Device Attributes

In the mobile marketing field, iOS system filtering has become a core action for enterprises to improve data quality. Whether it's app promotion or user growth, the lack of a precise iOS system filtering mechanism will lead to the budget being consumed by a large number of low-quality devices. Having worked in mobile data operations for five years and personally managed products with tens of millions of daily active users, I will share a proven device attribute filtering method below to help teams completely solve the problem of data pollution.

I. Why is iOS device attribute filtering the first step in data cleaning?

Many companies invest huge budgets in user acquisition, but the ROI continues to decline due to messy device data. A single careless iOS device import can trigger the following chain reaction:

  • Attribution bias : Devices running older versions of iOS cannot correctly transmit conversion data.

  • Activation Distortion : Jailbroken devices fake a large number of clicks to launder budget.

  • Retention failure : Emulators inject junk data in bulk, polluting real user profiles.

  • Out-of-control costs : Ineffective equipment consumes server resources, resulting in an additional 30% cost per thousand requests.

The essence of growth is not "quantity accumulation," but "quality filtering." iOS device attribute filtering = eliminating abnormal models + identifying high-value device environments, which is the foundation of data precision.

II. System Version Filtering: Locking iOS 12+ Core Active Layer

Devices running iOS versions lower than 11 account for less than 6% of the total, yet they contributed over 40% of the abnormal click behavior. In practice, we employed a triple version filtering mechanism:

  • Lower threshold blocking : Directly block iOS 10 and earlier versions, as these devices cannot run the core functions of mainstream apps.

  • Version segmentation statistics : iOS 12-14 are classified as the "high compatibility zone," and iOS 15+ are classified as the "potential upgrade zone," with corresponding promotional materials distributed to each segment.

  • Dynamic update strategy : Synchronize with Apple's official version distribution bulletin monthly and automatically adjust filtering thresholds.

Real-world example: After a game publisher enabled version filtering, the next-day retention rate jumped from 18% to 41% because it completely removed traffic from older devices that could not load the 3D engine.

III. Device Model Whitelist: Focuses on iPhone 8 and above with metal bodies

Conversion intentions varied by up to 7 times between different models. By establishing a model whitelist mechanism, high-net-worth users can be precisely targeted.

  • The core whitelist includes iPhone XR, iPhone 11, and iPhone 12 series; users of these models have a 2.3 times higher rate of paying for services compared to the average.

  • Potential gray list : iPhone 8 and iPhone 8 Plus, retained but not as primary targets for volume expansion.

  • Blacklist blocking : iPhone 6 and earlier models, iPad Wi-Fi version (behaviors without cellular data are often utility-based and have low commercial value).

Implementation Recommendation: Use the first 5 digits of the UDID for model identification, and cross-verify device authenticity using carrier interfaces. After implementation, a certain e-commerce app saw its average order value increase from 47 yuan to 126 yuan because it completely blocked the iPhone 5s cluster specifically designed to exploit promotional offers.

IV. Jailbreak and Emulator Detection: Cutting off the source of cheating traffic

A standalone emulator can impersonate tens of thousands of unique device IDs, while jailbroken devices can hijack the clickstream of real users. Our detection solution comprises three layers of attack and defense:

  • Environment detection : Check for jailbreak traces in Cydia, Magisk, etc., as well as /var/mobile/Libraryabnormal hook files in the directory.

  • Hardware fingerprinting : By comparing gyroscope, battery serial number, and Wi-Fi chip factory settings, emulators often leave these deep parameters blank or repeat them.

  • Behavioral timing : Normal users experience a 3-7 second reading delay from installation to the first click, while fraudulent traffic is often triggered continuously at the millisecond level.

Data supports this: After a social media app integrated the detection module, the number of fake devices blocked daily plummeted from 21,000 to less than 300, saving 87,000 yuan per month in server costs.

V. Screen resolution and DPI consistency verification: Identifying tampered code machines

While code-scraping devices can modify version numbers and model strings, they struggle to perfectly disguise screen physical parameters. We constructed a set of hard-validation logic:

  • Benchmark library establishment : Collect standard resolution (non-rendering resolution) and PPI values ​​of all iOS devices over the past three years.

  • Real-time comparison : Read com.apple.iokit.IOGraphicsFamilythe actual pixel size returned by the device and verify its consistency with the claimed model number.

  • Anomaly interception : Any device whose resolution/DPI does not match the model reference library is directly marked as high risk (even if the UDC verification passes).

Practical results: Using this method, a financial app discovered more than 8,000 iPhone 6 tampered phones disguised as iPhone 12 Pro, preventing a mass credit fraud incident and stopping losses of over 2 million yuan.

In actual delivery, all the above filtering rules require a screening tool that can execute in real time with low latency. After in-depth testing, our team finally implemented ITG's full-domain screening . This tool has a built-in iOS device attribute core engine. By simply selecting four preset policies in the background, such as "iOS 12+ only," "Exclude jailbreaks/emulators," and "Model whitelist," the system can complete a full-dimensional verification of a single device within 200 milliseconds—from system version to screen DPI, from jailbreak traces to carrier matching, and output a credibility score (0-100). More importantly, ITG supports asynchronous batch processing, which can clean 5 million iOS device lists per day with an accuracy of 99.93%, all without writing any code.

Conclusion

Data accuracy is never achieved overnight; it's the result of layering filtering rules. The essence of iOS system filtering is to eliminate noise at the source through device attributes and environmental characteristics, ensuring the operations team only interacts with users who are "real, capable of conversion, and willing to interact." From system version to model whitelisting, from jailbreak detection to DPI consistency verification, these five hurdles constitute the best practices for current industrial-grade data cleaning. The value of ITG's full-domain filtering lies in encapsulating these complex technologies into ready-to-use capabilities, allowing practitioners to directly obtain "purified" high-value iOS data without reinventing the wheel. Only when every penny of the budget reaches real, active devices does the flywheel of growth truly begin to turn.

ITG Global Screening is a leading global number screening platform that combines global number range selection, number generation, deduplication, and comparison. It offers bulk number screening and detection for 236 countries and supports 20+ social and app platforms such as WhatsApp, Line, Zalo, Facebook, Telegram, Instagram, Signal, Amazon, Microsoft and more. The platform provides activation screening, activity screening, engagement screening, gender/avatar/age/online/precision/duration/power-on/empty-number and device screening, with self-screening, proxy-screening, fine-screening, and custom modes to suit different needs. Its strength is integrating major global social and app platforms for one-stop, real-time, efficient number screening to support your global digital growth. Get more on the official channel t.me/itgink and verify business contacts on the official site. Official business contact: Telegram: @cheeseye (Tip: when searching for official support on Telegram, use the username cheeseye to confirm you are talking to ITG official.)