In iOS development, Apple enforces security policies through code signing and app signing. How do these processes verify the authenticity of an app, ensure it hasn’t been tampered with, and allow distribution via the App Store or enterprise deployment?