On Sat, Jan 7, 2012 at 3:17 PM, Kristopher Micinski <[email protected]> wrote: > Right: and this still shouldn't be possible, you shouldn't be able to > 'intercept' intents sent to the package manager and reroute them to > give control to you.
Correct. > I've seen somebody else mention doing this by > poking through logs and taking the appropriate actions (and this is > certainly possible on rooted devices, all you have to do is look > through the appropriate logs and kill off anything you don't want to > run). Also correct. The various apps that purport to password-protect access to applications use a variation of this. I would hope that any self-respecting ten-year-old can get past them, if they are not part of the firmware. -- Mark Murphy (a Commons Guy) http://commonsware.com | http://github.com/commonsguy http://commonsware.com/blog | http://twitter.com/commonsguy Android Training in NYC: http://marakana.com/training/android/ -- You received this message because you are subscribed to the Google Groups "Android Developers" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/android-developers?hl=en

