Glad Kevin clarified and noted most of the concerns that I had re: camera
(would make a good April 1st though.)

Lucas: without a trust-base on the device it's a very intractable problem
to solve, if not outright impossible.

-Hadi


On Fri, Oct 5, 2012 at 1:11 PM, Kevin Chadwick <[email protected]>wrote:

> On Fri, 5 Oct 2012 16:45:14 -0300
> Lucas Palma wrote:
>
> > Kevin, as mobile devices I'm talking about smartphones and tablets. The
> > picture idea can be an answer. It's a bit intrusive, but more difficult
> to
> > be faked.
>
> To be honest, I was joking, due to the impossible unforgeable
> requirement. I doubt a phone camera will be good enough even to pickup
> a large desktop screen and with picture cleanup.
>
> If you could get enough permissions you could try finding some magic
> bytes from the rom, imeis, mac addresses, touch device type,
> multi-touch capability (desktops have this but rare), processor type,
> device-width, perhaps pile it on so it's more effort than it's worth
> etc..
>
> --
> You received this message because you are subscribed to the Google Groups
> "Android Security Discussions" group.
> To post to this group, send email to
> [email protected].
> To unsubscribe from this group, send email to
> [email protected].
> For more options, visit this group at
> http://groups.google.com/group/android-security-discuss?hl=en.
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"Android Security Discussions" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/android-security-discuss?hl=en.

Reply via email to