View Single Post
Old 07-29-2010, 10:32 AM   #15
=X=
Wizard
=X= ought to be getting tired of karma fortunes by now.=X= ought to be getting tired of karma fortunes by now.=X= ought to be getting tired of karma fortunes by now.=X= ought to be getting tired of karma fortunes by now.=X= ought to be getting tired of karma fortunes by now.=X= ought to be getting tired of karma fortunes by now.=X= ought to be getting tired of karma fortunes by now.=X= ought to be getting tired of karma fortunes by now.=X= ought to be getting tired of karma fortunes by now.=X= ought to be getting tired of karma fortunes by now.=X= ought to be getting tired of karma fortunes by now.
 
=X='s Avatar
 
Posts: 3,671
Karma: 12205348
Join Date: Mar 2008
Device: Galaxy S, Nook w/CM7
Quote:
Originally Posted by scottjl View Post
actually, given the way apple apps work and their walled off access within the filesystem, they can't grab this kind of data nor access data outside their fenced in area. not without the user knowing about it. access to the address book, calendar, even your ipod playlists all has to go through approved apple api's.

what that app did was open a socks proxy, fairly standard port connection. all the code for the proxy was contained within the application itself.
Right that is the key issue here. Anrdoid, like BlackBerries, inform the user what access the app is requiring during install. If the user chooses to grant this level of access to the app then the app may do so. There is no way to bypass this security feature, not even RIM/Android apps can.

The problem is most people DON"T read the security warning and just simply hit ignore.

I don't care what anybody says, there is no way anybody can fool proof these kind of apps. And it is up to the user to be vigilant about what they install on their devices.

=X=

Last edited by =X=; 07-29-2010 at 11:10 AM. Reason: corrected typo
=X= is offline