Security is the latest buzzword in town. The Android ecosystem ensures that our database is exposed to prying eyes; however, a rooted device can leave our database exposed, as we saw in Chapter 2, Connecting the Dots. With the help of a rooted device, an emulator and the
adb pull command in our case, we pulled our database for inspection with the SQLite manager tool. Another important aspect is content providers; we need to be careful while setting permissions. We should make the process of applying appropriate permissions compulsory in order to inform users about the control that an app establishes over data, using the
In Chapter 3, Sharing is Caring, we briefly covered the topic of ...