Skip to main content

Questions tagged [android]

Questions tagged [Android] should focus on security of the operating system itself, or of Android-specific apps. Questions about Android that are not directly security-related should be asked at android.stackexchange.com.

0 votes
0 answers
20 views

Rcvd Error Response - Attribute Not Found for Heart Rate Measurement [closed]

I’ve been using the Fitbit Charge 6 Fitness Tracker with the Obsidian Silicone Strap and encountered a persistent issue related to heartbeat rate data retrieval. I consistently encounter the error ...
abdul's user avatar
  • 23
0 votes
0 answers
27 views

Is a key stored with setUserAuthenticationRequired more secure on rooted device

I am trying to figure out how much more protection keystore offers if a key is stored with setUserAuthenticationRequired(true) and setInvalidatedByBiometricEnrollment on a rooted device. As far i know ...
whd's user avatar
  • 123
1 vote
1 answer
60 views

Can a buyer recover data from a smartphone which was factory reset? [duplicate]

I sold my old smartphone to another person. I factory reset it wiped data and then sold it. I was wondering if it is still possible to recover some data from the phone by using recovery softwares?
Tea is life's user avatar
2 votes
2 answers
130 views

How to Sniff Bluetooth Traffic and Determine Encryption on Fitness Tracker Data?

I am attempting to analyze the Bluetooth communication between a fitness tracker (GOJI ACTIVE GFITBK20 Activity Tracker) and its corresponding application (Goji Active) installed on my Android phone. ...
abdul's user avatar
  • 23
4 votes
1 answer
540 views

How does Signal protect data on the device from unauthorized access?

Signal has moved to always store all data AES-encrypted on the device a few years ago. So, it is reasonable to assume that reading conversation data from a device at rest should be impossible. However,...
bitmask's user avatar
  • 627
0 votes
0 answers
46 views

Does the Samsung keyboard for Android phones send user input anywhere?

I've heard of this rumor (here, for example) but no clear investigation/confirmation.
2080's user avatar
  • 101
2 votes
1 answer
206 views

Is it possibile to capture unlock pin of smartphone(android/ios) using usb cable?

For example, bad USB cable( charging devices) loaded with script to record the unlock code of an android phone which is current being charged. so basically, the bad usb cable and the usb charger is ...
Maxfield's user avatar
  • 157
4 votes
2 answers
3k views

If my old device is infected, can my new device get viruses from my social media accounts?

Is it okay to log in my social media accounts (Facebook, Instagram, etc.) from my old phone that I believe is infected with viruses to my new phone? Can virus transfer because of that?
Jeszabami's user avatar
5 votes
0 answers
144 views

Android Find My Device Network Privacy

My Android device today popped up a screen indicating that it had joined the new Find My Device Network that allows two-way scanning of device locations over Bluetooth. Despite Google's claims of ...
Robert Chapin's user avatar
1 vote
3 answers
214 views

Can my phone got infected if visit my mail inbox without opening any mail attachments?

I've found some articles saying some viruses/malware can attack your device by just opening an email without downloading or opening any attachments. Is this true? If yes, how risky for ordinary mail ...
Sasi Bulan's user avatar
0 votes
0 answers
114 views

How does a pattern or a PIN secure an Android device with encryption?

Modern Android devices have encryption for the storage. It is secured with a key which is derived from the lock screen and a hardware bound key. We know that the rate limiting mechanism prevents brute ...
Michael Tsang's user avatar
0 votes
2 answers
118 views

How to Capture Mobile API Requests in burp when Server side pinning is implemented

I recently encountered a scenario where Mobile Application is generating CSR request, call a POST API request and in response, Ask Server for certificate. Server will respond with the temporary ...
Tejas Pandya's user avatar
9 votes
1 answer
4k views

Is it possible to identify a phone model by screenshot stripped of metadata?

I.e., by comparing the dimensions of the screenshot and size / position of UI elements, without the aid of metadata?
tom894's user avatar
  • 199
0 votes
1 answer
299 views

Is malware less prevalent in the Apple App Store compared to the Google Play Store?

I was searching for reports about malware on the Apple App Store and only found minor ones (at least from a user's perspective) on the first few Google search results. Doing the same search for the ...
Martin Thoma's user avatar
  • 3,932
0 votes
0 answers
210 views

MDM & "Work Profile" Implications on Android 14

What are the privacy implications of using an MDM "work profile" on your own Android 14 device? First, an MDM app such as MaaS360 must create the work profile while running in the personal ...
user19087's user avatar
  • 111

15 30 50 per page
1
2 3 4 5
93