On Sat, Sep 11, 2010 at 10:37 AM, Sebastián Treu
<[email protected]> wrote:
> I don't like to twist the topic, but curiosity is such that I want to
> know why. Can you provide a useful link or info on why it would be a
> security hole?

It's been discussed on this list a fair bit. If Application A can take
screenshots of Banking Application B, Contacts Application C, etc.,
then Application A can supply evil people with a lot of rather
interesting information.

-- 
Mark Murphy (a Commons Guy)
http://commonsware.com | http://github.com/commonsguy
http://commonsware.com/blog | http://twitter.com/commonsguy

_The Busy Coder's Guide to *Advanced* Android Development_ Version 1.9
Available!

-- 
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[email protected]
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Reply via email to