What I mean is that if the bad actor can manipulate the apk bytes
while still maintaining the same checksum, then the whole scheme is
insecure -- there's no point in having it signed.  A CRC32 checksum is
easily spoofed -- the apk bytes need to be checksummed with a
cryptographic checksum of some sort.

On Oct 8, 1:01 am, Dianne Hackborn <[email protected]> wrote:
> On Thu, Oct 7, 2010 at 6:22 PM, DanH <[email protected]> wrote:
> > So what is protecting the application from forgery?
>
> What do you mean?  This is the cert it is signed with.  Do you have some way
> to force the cert?
>
> --
> Dianne Hackborn
> Android framework engineer
> [email protected]
>
> Note: please don't send private questions to me, as I don't have time to
> provide private support, and so won't reply to such e-mails.  All such
> questions should be posted on public forums, where I and others can see and
> answer them.

-- 
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[email protected]
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Reply via email to