On Sat, Jan 7, 2012 at 2:31 PM, Mark Murphy <[email protected]> wrote: > On Sat, Jan 7, 2012 at 3:17 PM, Kristopher Micinski > <[email protected]> wrote: >> Right: and this still shouldn't be possible, you shouldn't be able to >> 'intercept' intents sent to the package manager and reroute them to >> give control to you. > > Correct. > >> I've seen somebody else mention doing this by >> poking through logs and taking the appropriate actions (and this is >> certainly possible on rooted devices, all you have to do is look >> through the appropriate logs and kill off anything you don't want to >> run). > > Also correct. The various apps that purport to password-protect access > to applications use a variation of this. I would hope that any > self-respecting ten-year-old can get past them, if they are not part > of the firmware. >
Surprisingly I see lots of people ask about this on this list, basically it is: "Oh, yeah, I understand it's possible to uninstall them in a few seconds, I don't really care, how do you do it?" kris -- You received this message because you are subscribed to the Google Groups "Android Developers" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/android-developers?hl=en

