O'Reilly logo

Bulletproof Android™: Practical Advice for Building Secure Apps by Godfrey Nolan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

More Sophisticated Attacks

As has been mentioned several times before in this book, the examples of insecure coding techniques that we’ve used come from real-world apps that we’ve encountered in a more or less ad hoc fashion over the past two to three years.

At its most basic, the insecure coding practices fall into the following categories:

Image Usernames and passwords stored as cleartext in shared preferences

Image Credit card data stored as cleartext in shared preferences

Encryption keys hard coded in the APK, exposing passwords or credit card data

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required