On Fri, Dec 21, 2012 at 10:51 AM, John McLear <johnym...@gmail.com> wrote:
> Kristopher I think a separate thread should be created if you want to
> address that issue specifically.
>
> Łukasz Sanek the phone has to be turned on "IE powered on" with the power
> button before NFC is enabled, so the exploit you mentioned is not actually
> possible, but your point is still valid however like with Kristopher's
> concern I think that is an issue for another thread.
Devil's advocate: under what use case does a user carry around a phone
that is powered off (if the battery is not dead)?

> Ducz thanks for your input and thoughts.  Perhaps your organization might
> also be interested in sponsoring some of the development.
>
> So as there has been no major objection I will go ahead putting together a
> draft proposal.
I think its a bad idea prima fascia. I think its they are data ingress
and data egress points, and that non-essential transfer/traffic could
occur without the user's knowledge. But I'd need to see the details to
be certain of my position.

Put another way, don't worry about the 'good' use cases. Think about
the 'bad' use cases, and what folks like Zdziarski, Miller, Zovi are
going to do.

> I will also reach out to the NFC Forum and Google to see if they would
> consider sponsoring the development.
>
> Would it be possible to look through previous commits to the master branch
> to see who wrote the bulk of the unlock functionality?  I think grabbing a
> few email addresses from there and bumping them to see if they would be
> interested would be the best practice from a security perspective as they
> should already be familiar with the code.  Thoughts/opinions on this?  If
> anyone can do my homework and grab some email addresses for me that would be
> fantastic :)
Yes, the previous commits are available on the web. See, for example,
https://android-review.googlesource.com/.

As you probably know/realize, its hit or miss whether someone will
write you back after you contact them.

Don't confuse Functionality with Best Practices. A lot of
functionality violates best practices. For example, writing
unencrypted data to an SD Card. But if you did not do it (or make the
choice available), folks would want to hang you from a yard arm. As
another example, some would consider using Android Beam to send
unencrypted data to an non-authenticated handset a violation of best
practices.

Also see http://source.android.com/source/submit-patches.html.

> Final call for objections / input please people, I don't want to go down
> this road only to be roadblocked by someone in the Android team.
You don't need AOSP/Google permission for this endeavor. As Kris
stated, a mod (e.g., Cyanogen or Clockwork) may be interested in the
work if mainline is not.

Jeff

-- 
You received this message because you are subscribed to the Google Groups 
"Android Security Discussions" group.
To post to this group, send email to android-security-discuss@googlegroups.com.
To unsubscribe from this group, send email to 
android-security-discuss+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/android-security-discuss?hl=en.

Reply via email to