On Sat, Jan 7, 2012 at 3:17 PM, Kristopher Micinski
<[email protected]> wrote:
> Right: and this still shouldn't be possible,  you shouldn't be able to
> 'intercept' intents sent to the package manager and reroute them to
> give control to you.

Correct.

> I've seen somebody else mention doing this by
> poking through logs and taking the appropriate actions (and this is
> certainly possible on rooted devices, all you have to do is look
> through the appropriate logs and kill off anything you don't want to
> run).

Also correct. The various apps that purport to password-protect access
to applications use a variation of this. I would hope that any
self-respecting ten-year-old can get past them, if they are not part
of the firmware.

-- 
Mark Murphy (a Commons Guy)
http://commonsware.com | http://github.com/commonsguy
http://commonsware.com/blog | http://twitter.com/commonsguy

Android Training in NYC: http://marakana.com/training/android/

-- 
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[email protected]
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Reply via email to