On Aug 9, 5:32 pm, Dianne Hackborn <[email protected]> wrote: > And also the biggest thing is that all of these attacks *do* require having > root, which is a small number of users.
Apparently, such attacks are also possible on any Droid 2, rooted or not: http://groups.google.com/group/android-developers/browse_frm/thread/53898e508fab44f6/cd1ca6332c1b1004 Given it's the successor to the original Droid, the all-time best- selling Android handset, it seems likely that this attack vector is now open to a much larger user base than before. Just a heads-up to anyone using ANDROID_ID in their LVL implementation. o_O String -- You received this message because you are subscribed to the Google Groups "Android Developers" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/android-developers?hl=en

