If the phone is physically compromised, does it mean that the files
are compromised no matter what read/write/execute permissions they
have?

Tony

On Tue, May 8, 2012 at 4:20 AM, Earlence <earlencefe...@gmail.com> wrote:
> you should create a bug on their tracker if they have one.
>
> -Earlence
>
> On May 7, 11:22 pm, Rado ANDRIATSIMANDEFITRA <andri...@gmail.com>
> wrote:
>> Technically yes because everybody can read the database
>>
>> Le lundi 7 mai 2012 16:12:10 UTC+2, Aditya Gupta a écrit :
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> > I was just analyzing the Whatsapp application for Android, used for
>> > instant messaging. To my surprise, i found out that, the database file
>> > where it stores its IM conversations log, is having the read permission for
>> > everyone.
>>
>> > Does that mean that i could create a malicious application and extract the
>> > msgstore.db file from it.
>
> --
> You received this message because you are subscribed to the Google Groups 
> "Android Security Discussions" group.
> To post to this group, send email to 
> android-security-discuss@googlegroups.com.
> To unsubscribe from this group, send email to 
> android-security-discuss+unsubscr...@googlegroups.com.
> For more options, visit this group at 
> http://groups.google.com/group/android-security-discuss?hl=en.
>

-- 
You received this message because you are subscribed to the Google Groups 
"Android Security Discussions" group.
To post to this group, send email to android-security-discuss@googlegroups.com.
To unsubscribe from this group, send email to 
android-security-discuss+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/android-security-discuss?hl=en.

Reply via email to