Updated App Security (markdown)
parent
661a12a3f7
commit
0543ad137e
|
@ -62,7 +62,7 @@ Does not protect against: memory dumps
|
|||
* Complicates the implementation (pass ``byte[]`` in ``Parcelables`` instead of ``Strings``?)
|
||||
* No convincing attack scenario (see argument below)
|
||||
|
||||
> Some people believe that you have to overwrite the memory used to store the password once you no longer > need it. This reduces the time window an attacker has to read the password from your system and > completely ignores the fact that the attacker already needs enough access to hijack the JVM memory to do > this. An attacker with that much access can catch your key events making this completely useless (AFAIK, so please correct me if I am wrong).
|
||||
> Some people believe that you have to overwrite the memory used to store the password once you no longer need it. This reduces the time window an attacker has to read the password from your system and completely ignores the fact that the attacker already needs enough access to hijack the JVM memory to do this. An attacker with that much access can catch your key events making this completely useless.
|
||||
|
||||
(from http://stackoverflow.com/a/8881461)
|
||||
|
||||
|
|
Loading…
Reference in New Issue