Conclusion

In the chapter we looked at how to secure network transmissions and the best approach to storing encryption keys. The primary takeaway here is that if there’s any personal information, you’re going to need to encrypt the data. What makes the most sense, if at all possible, is to keep all the customer data on the server and not on the phone. If you have to store any data, such as the API key, then asymmetric encryption will keep your data secure. We ended the chapter looking at how to test whether your app will keep your information encrypted during a MITM attack.

Get Bulletproof Android™: Practical Advice for Building Secure Apps now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.