Hello everyone,

Let's say there are hard security requirements that must include the
possibility of rooting a phone. So when a phone gets lost, the
sensitive data on it should still be as secure as possible even if the
phone is rooted.

Any hints and ideas on this?

The first thought was that one could generate a key based on some
device/user ID, but this information is available to all applications.
So given some reverse engineering and effort, this can be cracked too.

I am not exactly a security expert, but maybe there are some around
here in this group.

Thanks for all comments!

Regards,
Markus




--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers-unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to