[android-developers] Re: CRC32 checksum use in order to secure Android LVL Applications

2010-10-03 Thread DanH
The signature and the cert are two different things -- the cert contains the public key. If one could access the public key and sign the network interactions with that then the system would be insensitive to upgrades, vs the server having to keep track of every signature ever released. On Oct 3,

Re: [android-developers] Re: CRC32 checksum use in order to secure Android LVL Applications

2010-10-03 Thread Dianne Hackborn
It is the binary certificates that the app is signed with. Hopefully you are only signing with one cert, so there is only one Signature in the array. As for how to use it -- well it is the raw cert. You can get it as the raw binary data, or as encoded ASCII characters: http://developer.android.c

[android-developers] Re: CRC32 checksum use in order to secure Android LVL Applications

2010-10-03 Thread JonFHancock
I would really love a little guidance for how to use this. Maybe the documentation team could write something up? On Oct 2, 2:05 am, Dianne Hackborn wrote: > On Fri, Oct 1, 2010 at 2:11 PM, DanH wrote: > > What you really want to be sure of is that the application is signed > > with your certif

[android-developers] Re: CRC32 checksum use in order to secure Android LVL Applications

2010-10-02 Thread DanH
That interface says "signatureS". How does one know which is which? And is there a way to actually access the public certificate? On Oct 2, 4:05 am, Dianne Hackborn wrote: > On Fri, Oct 1, 2010 at 2:11 PM, DanH wrote: > > What you really want to be sure of is that the application is signed > >

Re: [android-developers] Re: CRC32 checksum use in order to secure Android LVL Applications

2010-10-02 Thread Dianne Hackborn
On Fri, Oct 1, 2010 at 2:11 PM, DanH wrote: > What you really want to be sure of is that the application is signed > with your certificate. (Of course, I've not yet found a way to access > that info.) http://developer.android.com/reference/android/content/pm/PackageManager.html#getPackageInfo(

[android-developers] Re: CRC32 checksum use in order to secure Android LVL Applications

2010-10-01 Thread JonFHancock
Well, until we figure out how to test against the signature, I used the method for finding the crc here: http://www.javafaq.nu/java-example-code-230.html using getApplicationContext().getPackageCodePath() as the file name. Fortunately, my app is 100% dependent on server data. So i just post the

[android-developers] Re: CRC32 checksum use in order to secure Android LVL Applications

2010-10-01 Thread DanH
Yeah, that's essentially what I was saying. On Oct 1, 4:45 pm, Kostya Vasilyev wrote: > Regarding signature checking - I think having LVL check the signature > against the correct one (known to Market) would be very useful in thwarting > attacks on LVL based on modifying the application code. > >

Re: [android-developers] Re: CRC32 checksum use in order to secure Android LVL Applications

2010-10-01 Thread Kostya Vasilyev
Regarding signature checking - I think having LVL check the signature against the correct one (known to Market) would be very useful in thwarting attacks on LVL based on modifying the application code. Pirates (hackers) don't have access to the developer's private key, so after modifying the appli

[android-developers] Re: CRC32 checksum use in order to secure Android LVL Applications

2010-10-01 Thread DanH
In theory there's no need to checksum your apk file, unless you suspect it's being dynamically modified. The apk was signed with your private key, and can't be modified by anyone else without invalidating the signature. What you really want to be sure of is that the application is signed with you

[android-developers] Re: CRC32 checksum use in order to secure Android LVL Applications

2010-10-01 Thread Moto
Might want to read about CRCs... to understand how it works: http://en.wikipedia.org/wiki/Cyclic_redundancy_check On Oct 1, 3:04 pm, Moto wrote: > You do a CRC32 over the actual application file, *.apk.  Open the file > and get the byte stream. Now it's tricky to do that and than hardcore > the

[android-developers] Re: CRC32 checksum use in order to secure Android LVL Applications

2010-10-01 Thread Moto
You do a CRC32 over the actual application file, *.apk. Open the file and get the byte stream. Now it's tricky to do that and than hardcore the CRC32 number in your app because it will change the value of the app computed CRC32 value. That is why he suggested to store it in a remote server... Fo