On Mon, Apr 11, 2011 at 10:44 PM, Bob Kerns <[email protected]> wrote:

> When a trusted CA signs a cert, they have done some leg work to verify that
> you are indeed who you say you are. Other than that, they're not adding
> value -- though I'd argue that's an important defense against malicious
> apps!
>

This is an interesting take on CAs:

https://docs.google.com/present/view?id=df9sn445_206ff3kn9gs&pli=1


> I don't know that there's any reason the cert you use has to be
> self-signed. If you have a code signing cert from one of the trusted CAs, it
> *should* work just fine. I've been curious about that....
>

Generally CAs only sign certs that are valid for a year or so, since that
model relies on continued verification.  Android is the opposite -- we want
you to have a self-signed cert that lasts a long time, since it is your real
identity.  You definitely do not want to use a cert that expires soon,
because there is currently no way to migrate to a new cert.  (We'll have a
solution at some point, there is plenty of time.)

But I don't know exactly how the Android team use the certs -- or perhaps
> they ignore them altogether and simply use the public key itself.
>

The Android platform treats the public cert as a binary blob.  If that
binary data is the same, then the cert is the same.  Otherwise it is not.

-- 
Dianne Hackborn
Android framework engineer
[email protected]

Note: please don't send private questions to me, as I don't have time to
provide private support, and so won't reply to such e-mails.  All such
questions should be posted on public forums, where I and others can see and
answer them.

-- 
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[email protected]
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Reply via email to