On Mon, Jul 22, 2013 at 1:08 PM, Ted Hopp <[email protected]> wrote:
> On Thursday, June 14, 2012 12:43:51 PM UTC-4, Dianne Hackborn wrote:
>>
>> The platform has an app signed with a cert.  If you want to install an
>> update to that app under a different cert, how could the platform trust that
>> this is actually coming from the author who owns the original cert without
>> the new app also being signed in some way with the original cert?  Note that
>> we don't use certificate authorities, so there is no root cert or such to go
>> back to, to try to verify some relationship between two certs.  Because we
>> use self-signing, you are ultimately the CA, and have responsibility for the
>> certs you generate.

Technically, yes (Cf, bridge certificates, etc.). Android however doesn't really
 understand X.509 certificates as such: it performs binary comparison on the
DER encoded certificate blob to check whether the signer is the same or
different, that's it. This is pretty central to the whole package management
/security model, so a very big part of the core OS will need to be re-written.
Thus, not likely to happen anytime soon.

-- 
-- 
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[email protected]
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en
--- 
You received this message because you are subscribed to the Google Groups 
"Android Developers" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/groups/opt_out.


Reply via email to