If the phone is physically compromised, does it mean that the files are compromised no matter what read/write/execute permissions they have?
Tony On Tue, May 8, 2012 at 4:20 AM, Earlence <earlencefe...@gmail.com> wrote: > you should create a bug on their tracker if they have one. > > -Earlence > > On May 7, 11:22 pm, Rado ANDRIATSIMANDEFITRA <andri...@gmail.com> > wrote: >> Technically yes because everybody can read the database >> >> Le lundi 7 mai 2012 16:12:10 UTC+2, Aditya Gupta a écrit : >> >> >> >> >> >> >> >> >> >> > I was just analyzing the Whatsapp application for Android, used for >> > instant messaging. To my surprise, i found out that, the database file >> > where it stores its IM conversations log, is having the read permission for >> > everyone. >> >> > Does that mean that i could create a malicious application and extract the >> > msgstore.db file from it. > > -- > You received this message because you are subscribed to the Google Groups > "Android Security Discussions" group. > To post to this group, send email to > android-security-discuss@googlegroups.com. > To unsubscribe from this group, send email to > android-security-discuss+unsubscr...@googlegroups.com. > For more options, visit this group at > http://groups.google.com/group/android-security-discuss?hl=en. > -- You received this message because you are subscribed to the Google Groups "Android Security Discussions" group. To post to this group, send email to android-security-discuss@googlegroups.com. To unsubscribe from this group, send email to android-security-discuss+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/android-security-discuss?hl=en.