I have no experience in cryptography, hence this basic question about
the AESObfuscator in Android LVL. The AESObfuscator uses app specific
info (say package id), device specific info (say
android.provider.Settings.Secure.ANDROID_ID) and a salt to generate a
key to encrypt the SharedPreference
Oh and the documentation on LVL obfuscation is to prevent people from easily
*modifying* the app to *remove* its LVL checks. This is in many ways a very
different issue than trying to protect data that is being stored on the
device. The LVL design has the server holding the private key that it
If someone has root, there is little you can do to really protect yourself
from them.
On Tue, Feb 15, 2011 at 9:10 AM, rajorshi groups.rajor...@gmail.com wrote:
I have no experience in cryptography, hence this basic question about
the AESObfuscator in Android LVL. The AESObfuscator uses app
3 matches
Mail list logo