Skip to content
This repository has been archived by the owner on Sep 6, 2019. It is now read-only.

A failsafe method #606

Closed
Siyah opened this issue Aug 29, 2013 · 5 comments
Closed

A failsafe method #606

Siyah opened this issue Aug 29, 2013 · 5 comments

Comments

@Siyah
Copy link
Contributor

Siyah commented Aug 29, 2013

I don't know if something like this is implated, anyway here is my plan.

After boot/while booting

Get Android ID from Xprivacy settings

Request Android ID from Android OS

Compare them

If not the same, send a broadcast or intent. So Llama/Tasker can put device to Airplane mode for owner to review before data leaks.

This idea might need a few tweaks, but I'd love to see something like this to prevent data leaks where owner can't access the device after it has booted. Like putting the device away after an update, while waiting for dalvik to regenerate and forgeting it for an hour.

A down side I've found; This might kill the chance for plausible deniability since it will broadcast xprivacy is not working. A rogue app might be listening for this to get the real data.

@M66B
Copy link
Owner

M66B commented Aug 29, 2013

There is already a notification XPrivacy is not enabled.

@M66B M66B closed this as completed Aug 29, 2013
@Siyah
Copy link
Contributor Author

Siyah commented Aug 29, 2013

That is true but I belive only on 4.3 with notification access enabled apps can read XPrivacy is not enabled. So there is no way to let the other apps to know that something is going wrong. It won't protect the data if there is no user available.

@M66B
Copy link
Owner

M66B commented Aug 29, 2013

IMHO it is not a good idea to send an intent, for the reason you have already given.

@M66B M66B reopened this Aug 30, 2013
@M66B
Copy link
Owner

M66B commented Aug 31, 2013

Maybe sending an intent that XPrivacy is running, so you can disable air plane mode is a better idea.

@M66B M66B closed this as completed in 32e709a Aug 31, 2013
M66B pushed a commit that referenced this issue Sep 1, 2013
@M66B M66B reopened this Sep 1, 2013
@M66B M66B closed this as completed in b9c0509 Sep 1, 2013
@fda77
Copy link
Contributor

fda77 commented Sep 6, 2013

If I am a malware app i would:

  • create a hashmap
  • add on every event i catch your android id to it
  • if i get a internet conection (firwall reconfigure/update/whatever) send your personal date to my master
    So I think this does not help.

Just my 17 cent :)

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

3 participants