On Aug 9, 5:32 pm, Dianne Hackborn <[email protected]> wrote:

> And also the biggest thing is that all of these attacks *do* require having
> root, which is a small number of users.

Apparently, such attacks are also possible on any Droid 2, rooted or
not:
http://groups.google.com/group/android-developers/browse_frm/thread/53898e508fab44f6/cd1ca6332c1b1004
Given it's the successor to the original Droid, the all-time best-
selling Android handset, it seems likely that this attack vector is
now open to a much larger user base than before.

Just a heads-up to anyone using ANDROID_ID in their LVL
implementation. o_O

String

-- 
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[email protected]
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Reply via email to