Ah cool! It would be awesome to have the EXIF stripping work on a
stream, rather than a file.
.hc
Michael Rogers:
> Fantastic!
>
> The code is just a single file with minimal Android dependencies, so I
> made a quick (untested) Java port:
>
> https://code.briarproject.org/akwizgran/metadata
So Signal just switched from its custom encrypted store to good ol'
android-database-sqlcipher, which is lovingly maintained by Zetetic:
https://github.com/signalapp/Signal-Android/commit/f36b296e2ed211893835372513da57bb135c52c1
Its a good example for hooking up SQLCipher to the Android
Is there a TL;DR on how they manage to decrypt messages before the database
gets unlocked?
They need to have the keys accessible somewhere right?
Vanitasvitae
Am 28. März 2018 21:02:17 MESZ schrieb Hans-Christoph Steiner
:
>
>So Signal just switched from its custom
Fantastic!
The code is just a single file with minimal Android dependencies, so I
made a quick (untested) Java port:
https://code.briarproject.org/akwizgran/metadata
Cheers,
Michael
On 26/03/18 22:32, Hans-Christoph Steiner wrote:
>
> Turns out Google released an Android Support library that