On Feb 7, 9:43 am, Christoph Studer <[email protected]> wrote:
> (Note that rooted devices do not provide this security, because any
> application can possibly become root and do whatever it wants on the
> phone, AFAIK. But that's the user's risk when rooting a device.)
Suppose user loses phone. Finder then roots it and uses adb to pull
the database and preferences files -> Damage done. I consider it good
practice to assume *anything* that's stored on the device is "up for
grabs".
Even with encryption things may be dicey. Finder may have success
retrieving the original password through a reverse lookup. Just by
what Google does (crawling the web), they've indexed a sizeable number
of MD5 passwords for a reverse lookup.
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[email protected]
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en
-~----------~----~----~----~------~----~------~--~---