Hello everyone, Let's say there are hard security requirements that must include the possibility of rooting a phone. So when a phone gets lost, the sensitive data on it should still be as secure as possible even if the phone is rooted.
Any hints and ideas on this? The first thought was that one could generate a key based on some device/user ID, but this information is available to all applications. So given some reverse engineering and effort, this can be cracked too. I am not exactly a security expert, but maybe there are some around here in this group. Thanks for all comments! Regards, Markus --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Android Developers" group. To post to this group, send email to android-developers@googlegroups.com To unsubscribe from this group, send email to android-developers-unsubscr...@googlegroups.com For more options, visit this group at http://groups.google.com/group/android-developers?hl=en -~----------~----~----~----~------~----~------~--~---