Glad Kevin clarified and noted most of the concerns that I had re: camera (would make a good April 1st though.)
Lucas: without a trust-base on the device it's a very intractable problem to solve, if not outright impossible. -Hadi On Fri, Oct 5, 2012 at 1:11 PM, Kevin Chadwick <[email protected]>wrote: > On Fri, 5 Oct 2012 16:45:14 -0300 > Lucas Palma wrote: > > > Kevin, as mobile devices I'm talking about smartphones and tablets. The > > picture idea can be an answer. It's a bit intrusive, but more difficult > to > > be faked. > > To be honest, I was joking, due to the impossible unforgeable > requirement. I doubt a phone camera will be good enough even to pickup > a large desktop screen and with picture cleanup. > > If you could get enough permissions you could try finding some magic > bytes from the rom, imeis, mac addresses, touch device type, > multi-touch capability (desktops have this but rare), processor type, > device-width, perhaps pile it on so it's more effort than it's worth > etc.. > > -- > You received this message because you are subscribed to the Google Groups > "Android Security Discussions" group. > To post to this group, send email to > [email protected]. > To unsubscribe from this group, send email to > [email protected]. > For more options, visit this group at > http://groups.google.com/group/android-security-discuss?hl=en. > > -- You received this message because you are subscribed to the Google Groups "Android Security Discussions" group. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/android-security-discuss?hl=en.
