Just for the sake of argument, what do you think is the worst thing that a 
malicious app can do if one of its classes is loaded into another app that 
is using this technique?  I understand there could be problems if you call 
methods on a loaded class and happen to pass it a reference to something 
sensitive.  But just loading a class?

Doug

On Thursday, March 10, 2011 11:32:31 AM UTC-8, Shri wrote:
>
> With Context.createPackageContext, you can use the 
> CONTEXT_IGNORE_SECURITY flag along with CONTEXT_INCLUDE_CODE to load 
> the code in the apk. You will then need to do your own security 
> checks, which is probably making sure that the .apk you are loading is 
> signed with the same certificate as your own. Yup, you do need to be 
> careful here to avoid creating security bugs. 
> <http://commonsware.com/training>

-- 
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Reply via email to