Hi, How much of the security model breaks if the phone is rooted? Is there an article on this? I am trying to write a secure app that transfers sensitive information between apps, but I am worried if the user roots their phone and spawns a malicious app as root, that the security model will break apart.
J -- You received this message because you are subscribed to the Google Groups "Android Security Discussions" group. To view this discussion on the web visit https://groups.google.com/d/msg/android-security-discuss/-/bxGgkB6GOrkJ. To post to this group, send email to android-security-discuss@googlegroups.com. To unsubscribe from this group, send email to android-security-discuss+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/android-security-discuss?hl=en.