Hi You have the keystore of the browser. You can access it from a WebView.
Andre On Tue, Jun 10, 2008 at 6:04 PM, Justin (Google Employee) <[EMAIL PROTECTED]> wrote: > > If the keystore file is password protected, why not store it > encrypted? Then have the user enter her password to start using the > keystore and decrypt it on demand? I believe this is the approach used > by many keystore implementations. > > Cheers, > Justin > > > On Jun 10, 5:06 am, rayback_2 <[EMAIL PROTECTED]> wrote: >> Hi >> >> My puprose is to safely store a secretkeys ,used for encryption/ >> decryption process., in a keystore file in android. The keystore is >> password protected, but open to brute force attacks if it can be >> exported to regular PCs. >> >> I read in SDK that application can not access private memory of other >> applications, which is great, so inside a phone I am considering >> myself as safe. My concern is when the phone (device) is connected to >> computer, then everything is exportable to computer (as in emulator), >> and so is the keystore file which is then open to attacks. >> >> One solution to this would be to use cryptographic mini/microSD cards, >> but its rather expensive (and beside could not find such a product >> too). >> >> So my question is : Is there any area inside an android, where we >> could keep a private data which will not be exportable in any way ? >> >> Sincerely >> Ray > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Android Developers" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [EMAIL PROTECTED] Announcing the new M5 SDK! http://android-developers.blogspot.com/2008/02/android-sdk-m5-rc14-now-available.html For more options, visit this group at http://groups.google.com/group/android-developers?hl=en -~----------~----~----~----~------~----~------~--~---

