From b8b1ac9c9dc098ccd1f77d682e4c5b655d967cae Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Dominik=20Sch=C3=BCrmann?= Date: Thu, 19 Mar 2015 14:15:36 +0100 Subject: [PATCH] Updated App Security (markdown) --- App-Security.md | 7 +------ 1 file changed, 1 insertion(+), 6 deletions(-) diff --git a/App-Security.md b/App-Security.md index ec1291a..4491bba 100644 --- a/App-Security.md +++ b/App-Security.md @@ -60,12 +60,7 @@ jhat passphrase_cache.hprof ![](https://github.com/open-keychain/open-keychain/raw/master/Resources/docs/passphrase2.png) ![](https://github.com/open-keychain/open-keychain/raw/master/Resources/docs/passphrase3.png) -#### Outcome -Passhrases are in memory, even after timeout (only true for Strings)! Thus: - -Protects against: Attacker taking a misplaced smartphone, were the passphrase is still cached and no unlock screen is enabled -> signs/decrypts things - -Does not protect against: memory dumps +Strings are in memory, even after timeout! ### Links * http://blog.sei.cmu.edu/post.cfm/secure-coding-for-the-android-platform