I have no experience in cryptography, hence this basic question about
the AESObfuscator in Android LVL.  The AESObfuscator uses app specific
info (say package id), device specific info (say
android.provider.Settings.Secure.ANDROID_ID) and a salt to generate a
key to encrypt the SharedPreference file where the ServerManagedPolicy
stores my license information. Now, the app id and the device id are
well known. It will be a simple matter to decompile my app to obtain
the salt even if I obfuscate my code. Won't somebody be able to
generate the key using the three values and edit the SharedPreferences
file easily on a rooted phone? On a non-rooted phone I guess I can
just make the file private and nobody else will be able to access it,
but, what do I do on rooted phones? I can't help feeling I am missing
something here. Why else would the documentation on LVL put so much
emphasis on refactoring and obfuscating LVL to prevent others from
patching the library when a much simpler way would be to just get the
salt and edit the preferences file? Can someone enlighten me on
this?

~rajorshi

-- 
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[email protected]
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Reply via email to