[android-developers] Securing the SharedPreferences file using AESObfuscator in LVL

2011-02-15 Thread rajorshi
I have no experience in cryptography, hence this basic question about the AESObfuscator in Android LVL. The AESObfuscator uses app specific info (say package id), device specific info (say android.provider.Settings.Secure.ANDROID_ID) and a salt to generate a key to encrypt the SharedPreference

Re: [android-developers] Securing the SharedPreferences file using AESObfuscator in LVL

2011-02-15 Thread Dianne Hackborn
Oh and the documentation on LVL obfuscation is to prevent people from easily *modifying* the app to *remove* its LVL checks. This is in many ways a very different issue than trying to protect data that is being stored on the device. The LVL design has the server holding the private key that it

Re: [android-developers] Securing the SharedPreferences file using AESObfuscator in LVL

2011-02-15 Thread Dianne Hackborn
If someone has root, there is little you can do to really protect yourself from them. On Tue, Feb 15, 2011 at 9:10 AM, rajorshi groups.rajor...@gmail.com wrote: I have no experience in cryptography, hence this basic question about the AESObfuscator in Android LVL. The AESObfuscator uses app