I'm also interested in the possibility of accessing at least CERT.RSA
or CERT.SF from META_INF to compare digests from that file with my own
ones.
Or may be there is another way to detect repacking of your APK and
signing it with non-original certificate.
Any ideas?
On Oct 5, 9:16 am,
OK,
The apk file is not unpacked after installation, it stored as is
inside android either in internal memory or on SD-card in android-
secure directory.
Here is the code that I wrote to access the CERT.RSA file from inside
the application.
It seems that this is the only way, but maybe I'm wrong.
On Wed, Oct 5, 2011 at 5:06 PM, Leo leonidthek...@gmail.com wrote:
OK,
The apk file is not unpacked after installation, it stored as is
inside android either in internal memory or on SD-card in android-
secure directory.
Here is the code that I wrote to access the CERT.RSA file from inside
3 matches
Mail list logo