Updated App Security (markdown)
parent
8aea50b39c
commit
d6ff4e3b46
|
@ -21,6 +21,7 @@ From ``./lint --show AllowBackup``:
|
||||||
* Other apps already cannot access Openkeychain's stored data, this is enforced by Android's sandboxing
|
* Other apps already cannot access Openkeychain's stored data, this is enforced by Android's sandboxing
|
||||||
* If a malicious app executes an exploit and gains root access, again: It can access the stored but encrypted secret keys, getting the private values requires reading the memory, this attack is not prevented by encrypting the database "again" on top of the encrypted private values.
|
* If a malicious app executes an exploit and gains root access, again: It can access the stored but encrypted secret keys, getting the private values requires reading the memory, this attack is not prevented by encrypting the database "again" on top of the encrypted private values.
|
||||||
* We would require another password for unlocking the SQLCipher database, so more inconvenience
|
* We would require another password for unlocking the SQLCipher database, so more inconvenience
|
||||||
|
* The only argument, I can think of is protecting against root apps dumping the database and then gaining access to all public keys and thus a nice social graph, but hey, there are easier ways to get that information, maybe simply dumping the address database ;)
|
||||||
|
|
||||||
|
|
||||||
### So how to backup/synchronize keys?
|
### So how to backup/synchronize keys?
|
||||||
|
|
Loading…
Reference in New Issue