Conclusion

In this chapter we looked at how developers have tried to secure usernames and passwords with varying degrees of success. We also covered how to use Keyczar to create a more robust authentication mechanism. We looked at Android licensing and how it has been cracked. We looked at OAuth and how to use Facebook as a third-party login mechanism. We finished with some discussion on how mobile behavior can crack even the most secure systems, through no fault of your own, and what you can do to combat this.

Get Bulletproof Android™: Practical Advice for Building Secure Apps now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.