On Sat, Sep 11, 2010 at 10:37 AM, Sebastián Treu <[email protected]> wrote: > I don't like to twist the topic, but curiosity is such that I want to > know why. Can you provide a useful link or info on why it would be a > security hole?
It's been discussed on this list a fair bit. If Application A can take screenshots of Banking Application B, Contacts Application C, etc., then Application A can supply evil people with a lot of rather interesting information. -- Mark Murphy (a Commons Guy) http://commonsware.com | http://github.com/commonsguy http://commonsware.com/blog | http://twitter.com/commonsguy _The Busy Coder's Guide to *Advanced* Android Development_ Version 1.9 Available! -- You received this message because you are subscribed to the Google Groups "Android Developers" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/android-developers?hl=en

