Chapter 18. Security

WHAT'S IN THIS CHAPTER

  • Understanding device and data security

  • Using encryption to protect data on the device

  • Authenticating the current user

  • How to integrate with online platforms such as Twitter and Facebook

Increasingly, smart phones have become more like a mini-computer in your pocket rather than a simple device that can only make and receive phone calls. This movement has brought with it some major security challenges. As mobile phones travel with us, there is a much higher risk of them being stolen or simply misplaced. Their increasing storage and computing power means that they can also contain a large amount of personal information about ourselves, our friends, and our work. There is also the usual conflict between convenience and data security. You want the information on your phone to be readily accessible, yet you also want it to be protected. In this chapter, you'll learn how you can protect Windows Phone application data both on the device and on the wire. You'll also see how you can use several different authentication techniques to access remote data in a secure fashion.

ON THE DEVICE

There are a couple of aspects to protecting data that resides on the device. These include securing access to the device, being able to clear or reset the device in case it is lost, and securing the data in a format that can't easily be compromised.

Device Security

The best way to ensure that the data on your phone is secure is to protect the device itself from unwanted attention ...

Get Professional Windows® Phone 7 Application Development: Building Applications and Games Using Visual Studio, Silverlight®, and XNA® now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.