On Tue, Mar 27, 2012 at 3:13 PM, Subbu Srinivasan <ssriniva...@gmail.com> wrote:
> We started off with client-server, moved to web/browser centric and now we
> are again back to thick client apps on mobile devices.
>
> Have people thought about ways to notify a user whether this is a safe app
> that user can enter credentials on ?
Notifying a user about "safe-ness" is rather subjective. I'm not sure
how you would do it in practice. Would safe-ness be judged by
Marketplace stars?

Entering and saving credentials really depends on your threat model.
For example, your bank is willing to give away the checking and
provide mobile banking apps because they will make the money on you
through lesser-advertised fees (such as a $50 bounced check). They
also know there will be some abuse of the PIN code and accounts, but
they swallow it for the bigger pay-out.

On a thick client, the client is proably maintaining state so the bad
guy controls the state. Your company must accept the fact that a bad
guy will present erroneous input in an effort to cheat the system.

My employer allows me to use a non-jailbroken device on the corporate
network via wifi. I have very little trust in 802.11, the operating
system, and their underlying security, so I won't enter my domain
credentials (even if "don't save" is checked).

Jeff

-- 
You received this message because you are subscribed to the Google Groups 
"Android Security Discussions" group.
To post to this group, send email to android-security-discuss@googlegroups.com.
To unsubscribe from this group, send email to 
android-security-discuss+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/android-security-discuss?hl=en.

Reply via email to