Thanks a lot for all your responses.
And btw is it so that all services/activities within the system partition
only have a temporary privilege escalation to root? Or is there anything on
the system partition like some daemons all the time running as root? And if
not, is this done as a conscious
Ok 'mount' via terminal gives permission denied. seems good
On Wed, Aug 3, 2011 at 9:01 AM, patrick Immling pimml...@googlemail.comwrote:
Thanks a lot for all your responses.
And btw is it so that all services/activities within the system partition
only have a temporary privilege escalation
Hello,
I'm developing an app which is passing some confidential info to a few
services (WifiManager and AccountManager to be precise) in plaintext
form. Can someone please let me know how easy or difficult it is for
hacking the Context of an app and spoof these services? I'm
essentially looking at
FYI the last time I elevated access to a device I did it with a simple
command-line app - no apk wrapper. (Saved it to a writable directory on
/data and ran it from adb shell.)
There isn't anything inherently more secure about the lower level interfaces
to prevent someone from writing an exploit
On Wednesday, August 3, 2011 4:01:39 AM UTC-4, patrick Immling wrote:
@Chris: So the ONLY way exploits gets into the Android is by means of Apps.
No, not at all. Most are initially done using adb. A few have been done via
web pages and the like.
Or to elaborate, even native exploits are
On Wednesday, August 3, 2011 4:13:21 AM UTC-4, patrick Immling wrote:
Ok 'mount' via terminal gives permission denied. seems good
In this case, probably yes.
But permission denied is one of the few error messages some versions of the
android toolbox package knows, and it uses it for almost