Updated App Security (markdown)
parent
03bfc529f9
commit
8a060f7356
|
@ -22,6 +22,7 @@ From ``./lint --show AllowBackup``:
|
|||
* If a malicious app executes an exploit and gains root access, again: It can access the stored but encrypted secret keys, getting the private values requires reading the memory, this attack is not prevented by encrypting the database "again" on top of the encrypted private values.
|
||||
* We would require another password for unlocking the SQLCipher database, so more inconvenience
|
||||
* The only argument, I can think of is protecting against root apps dumping the database and then gaining access to all public keys and thus a nice social graph, but hey, there are easier ways to get that information, maybe simply dumping the address database ;)
|
||||
* SQLCipher makes sense for apps such as TextSecure or Threema to protect the **decrypted** messages, but OpenKeychain does not store anything besides keys.
|
||||
|
||||
|
||||
### So how to backup/synchronize keys?
|
||||
|
|
Loading…
Reference in New Issue