Hi, you could search for the "su" binary or open a shell and try to execute "su".
Regards Dominik On 04.12.2012 00:15, Subbu Srinivasan wrote: > So what are the most reliable ways to detect jail broken devices. > > > On Mon, Dec 3, 2012 at 1:43 PM, Jeffrey Walton <[email protected]> wrote: > >> On Sun, Dec 2, 2012 at 3:32 AM, JonS <[email protected]> wrote: >>> >>> How much of the security model breaks if the phone is rooted? Is there >> an >>> article on this? I am trying to write a secure app that transfers >> sensitive >>> information between apps, but I am worried if the user roots their phone >> and >>> spawns a malicious app as root, that the security model will break apart. >> Yep. That's a problem with systems that use Discretionary Access >> Controls (DACs). >> >> It is usually dealt with in a couple of ways. First, use SEAndroid >> which moves to policy based Mandatory Access Controls (MACs). Under >> SEAndroid, root is just another user who is contained. >> >> Second is policy and procedures. You create a policy that says, "you >> cannot root or jail break your phone," and you place procedures to >> detect rooting or jailbreaks. Then you get yourself a stick - the >> carrot is optional. >> >> Jeff >> >> -- >> You received this message because you are subscribed to the Google Groups >> "Android Security Discussions" group. >> To post to this group, send email to >> [email protected]. >> To unsubscribe from this group, send email to >> [email protected]. >> For more options, visit this group at >> http://groups.google.com/group/android-security-discuss?hl=en. >> >> >
signature.asc
Description: OpenPGP digital signature
