Hi,

How much of the security model breaks if the phone is rooted?  Is there an 
article on this?  I am trying to write a secure app that transfers 
sensitive information between apps, but I am worried if the user roots 
their phone and spawns a malicious app as root, that the security model 
will break apart.

J

-- 
You received this message because you are subscribed to the Google Groups 
"Android Security Discussions" group.
To view this discussion on the web visit 
https://groups.google.com/d/msg/android-security-discuss/-/bxGgkB6GOrkJ.
To post to this group, send email to android-security-discuss@googlegroups.com.
To unsubscribe from this group, send email to 
android-security-discuss+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/android-security-discuss?hl=en.

Reply via email to