If your HW/OS doesn't allow verification of binaries, but your threat model requires doing that, then you need to use proper HW/OS that allows the verification. Also, iOS is proprietary so who knows what the OS is doing anyway. Also, this
https://thehackernews.com/2014/01/DROPOUTJEEP-NSA-Apple-iPho...