Reputation: 650
I am developing an app that handles sensitive data.
The app has a reasonable security model that includes encryption,SSL and data is not stored persistently on the device.
I am trying to determine whether my app is “safe” running on rooted devices or the fact that the device is rooted will make much easier to exploit/hack the app. So the question is: should an app handling sensitive data run on rooted devices?
I have done research but I have not seen any discussion about the safety of rooted devices though. I am aware that the methods to detect rooted devices could potentially been circumvented and thus what’s the point of not supporting rooted devices?
Upvotes: 5
Views: 1564
Reputation: 3325
Are apps compromised in Android rooted devices? Yes they are.
Even on a non-rooted phone, there is still a possibility for the attackers to capture the vulnerabilities and take root control (GingerBreak is one of the show case). So there is no 100% the phone is not compromised even if it is not rooted by the users.
As you mentioned, the detections for root cannot be totally reliable as they can be bypassed. However, still if you detect the phone rooted, you should definitely block it. In case that you don't detect it, it doesn't mean the phone is not rooted and you still need to have security mechanism against the attacks for rooted phone.
There are a couple type of attacks that you may need to cope with: Man-In-The-Middle attacks, keyloggers, screencaptures, user-mode rootkits, kernel-mode rootkits, ...
The good news is that there are companies that make libraries for you to protect your apps against such type of attacks. They offer you solution to free yourself from headache as they will care abt it for you. V-Key is one of those, you can look at their website and consider if you want to buy their V-Guard product.
Upvotes: 1
Reputation: 82563
The biggest security concerns to apps on rooted devices are that:
The best you can do is:
savedValue = ((((realValue*10)+1)/365*23)*50)+1;
This makes it hard for a hacker to edit your saved value and get a desired result, though since he/she would have decompiled your apk, it's a very basic protective measure.These are just some suggestions I could think of. I am by no means a security expert, and you might want to consult one of those on this matter.
Upvotes: 5