Well, of course it works.  But it won't provide much value.

Why? Because Android's security model (which I like) allows you installing Apps
that may do potentially bad things without corrupting the OS.  One such bad 
thing
is (for example) using keys of other Apps to do "background transactions".

The only way to thwart that without completely revising the security model is
to "tag" keys in such a way that only apps specified by the issuer will be 
allowed
using a specific key.  This is only possible if you integrate the key handling 
in the
OS itself.  It also requires a way to describe and issue "tagged" keys.

Other features needed are trusted path PIN input which is about a key attribute
telling that that a key can only be unlocked by a PIN going through a trusted 
path
of the OS.  That is, even if you steal a PIN through a spoofed GUI, you 
wouldn't be
able to use it except through physical access to the device.

Pardon for being a PITA but mobile phones should IMO not inherit all the legacy
c**p we have in desktop systems.

Anders Rundgren
-- 
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to