It sounds like they used a combination of decompiling and static code analysis ? Or maybe as simple as 'strings' on the file. This is nothing special to AIR (or .swf) applications, and it's a huge topic.

If you have sensitive data (like passwords) the general advice is

* don't use the same password for every install
For instance, generate a new password when the application registers
* don't store the password in the app
Have the app ask the server for the password when it starts up

In your case, you are unzipping a password protected ZIP ? So you are making a server request anyway. I assume you are protecting against someone capturing the request and obtaining their own copy of your files ? I don't know your threat model, but you should be aware users can just browse the file system on the device to get the files after extraction, or brute force the .zip password (depending on the encryption scheme), for instance.

We could talk all day about threat analysis, risk/reward and return on investment :-)

Tom

On 04/03/15 08:17, Deepak MS wrote:
I'm new to security thingie and have no idea. Can anyone who have worked on
this kindly  share best practices?

Reply via email to