> They use a CRC32 to protect the code?  That's easily spoofed.  It's
> only intended to detect accidental changes to the data.

What?  I don't think anybody said they use a CRC32 to protect code.  I
was saying that the Signature does not change from build to build like
a CRC32 would.



On Oct 7, 10:58 am, DanH <[email protected]> wrote:
> They use a CRC32 to protect the code?  That's easily spoofed.  It's
> only intended to detect accidental changes to the data.
>
> On Oct 7, 12:23 pm, JonFHancock <[email protected]> wrote:
>
>
>
>
>
>
>
> > The Signature does not change on every build.  The signature is not
> > the same as a CRC32.  I have already put out 3 updates with various
> > code changes since I started using the server-side signature
> > checking.  I haven't changed the server-side code, and the app keeps
> > on working.  If I try a development build, it fails, because it is
> > signed with a development key rather than my key from my keystore.
>
> > I'm not sure what makes it the same, but I'm guessing as long as the
> > package name is the same, and it is signed with the same key, it will
> > have the same signature.  The package manager won't even update an app
> > if the signature is different.
>
> > Still, my server-side method is susceptible to cracking.  There is
> > still a string being passed to the server that can be forged if the
> > cracker finds where to inject it.  I have probably made a silly
> > mistake in giving the POST variables semantic names.  The obfuscator
> > can't change them because that would break things server-side.  I
> > think in my next release, i am going to anonymize the
> > POST variables to arg1, arg2 etc...  making it a little more confusing
> > to hack.
>
> > I also update the api version number with every release, and deprecate
> > the api_version -2 every release.  Thus forcing the users to update to
> > keep their app working, and making hackers have to do their work all
> > over again.
>
> > On Oct 7, 2:33 am, String <[email protected]> wrote:
>
> > > On Oct 7, 5:11 am, William Ferguson <[email protected]>
> > > wrote:
>
> > > > The one thing that it seems they will have to do is to change your
> > > > package name to theirs, otherwise Market (AFAICT) won't allow it a
> > > > duplicate package name to be published.
> > > > So is it sufficient to just confirm that the package name is the same?
>
> > > I don't think that helps. The pirates aren't interested in publishing
> > > it to the Market; they distribute it on their own sites and through
> > > forums. So they're free to keep the package names unchanged.
>
> > > They have to change the signature, though. No getting around that.
>
> > > String

-- 
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[email protected]
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Reply via email to