Skip to main content

All Questions

Tagged with
2 votes
2 answers
130 views

How to Sniff Bluetooth Traffic and Determine Encryption on Fitness Tracker Data?

I am attempting to analyze the Bluetooth communication between a fitness tracker (GOJI ACTIVE GFITBK20 Activity Tracker) and its corresponding application (Goji Active) installed on my Android phone. ...
abdul's user avatar
  • 23
3 votes
1 answer
440 views

What can forensic analysts extract from a fully encrypted phone? [closed]

I was very disappointed to hear that my friend, who had his Android phone seized not too long ago, has had his phone broken by police forensics. As far as I know, it was a few years old, Samsung, and ...
Elizabeth Vogue's user avatar
1 vote
0 answers
249 views

Are Android Bluetooth file transfers encrypted?

Suppose I pair two Android phones together using Bluetooth and transfer a file from the first phone to the second by sharing the file using Bluetooth. Does Android encrypt the file transfer so that no ...
Flux's user avatar
  • 923
1 vote
1 answer
1k views

Android File Encryption without screen lock

I am trying to understand the FBE Key generation and verification process at every boot. My device is going to be handled without a lock screen (Android 11 with FBE + Metadata Encryption Enabled), so ...
Sneha Sharma's user avatar
4 votes
2 answers
2k views

Data and Account security on Android phone in case of it being stolen

How secure are Android smartphones when someone gets physical access to the phone, in other words, someone stealing my phone and how to improve this security? I'm especially worried about all the ...
Nicole's user avatar
  • 73
2 votes
4 answers
1k views

End-to-end encryption with multiple recipients?

As far as I understand, end-to-end encryption is used to encrypt the content on the client (sender), send it to the server and decrypt it on the client (recipient). The clients store their private ...
JavaForAndroid's user avatar
0 votes
1 answer
1k views

Burp suite: URL encoding of request body - Is this safe?

Analyzing an android app's traffic POST request, it sends some important pieces of data in the form of URL encoding. This is pretty easy to decode and get the data. The data is sent over HTTPS. But is ...
Supraja's user avatar
1 vote
0 answers
446 views

How does Android 12 / Pixel 6 allow data access before encryption key entry?

Following on from Why do mobile devices force user to type password after reboot?, I've noticed that my Pixel 6 Pro can access data after a restart. e.g. WhatsApp messages come through and ...
SilverlightFox's user avatar
1 vote
0 answers
188 views

When the phone breaks and I regret encryption

I believe most new Android phones have full encryption enabled by default, so even if I just download some PDF weather report from the internet, it will sit encrypted on my phone's SSD. Now, suppose ...
bobuhito's user avatar
  • 240
0 votes
0 answers
136 views

Utilities and apps that bypass Google password/security

How do applications(UnlockGo) that allow one to connect their Android to PC work in removing password? I thought the password also is used to encrypt Android device. Is the data erased? i.e. ...
paulj's user avatar
  • 157
0 votes
0 answers
995 views

Storing a private key in android/ios keychain encrypted or not

In my app, the user must use a private key to sign a transaction (on a blockchain). (It is quite common) I am facing questions regarding how to store my user's private key on the device. I am to use a ...
Raphael St's user avatar
10 votes
1 answer
2k views

Are fingerprints less secure (at a software level) on Android (10+)?

Inspired by this question (and more specifically, this answer to the same): When a passphrase is used, the encryption key is not stored directly in the device. […] When using biometrics, each reading ...
Matthew's user avatar
  • 433
13 votes
2 answers
5k views

Why does an encryption key derived from your lock screen password give you stronger protection (in Android 11)?

Why does an encryption key derived from your lock screen password give you "stronger protection" than a key chosen by the machine (or at any rate not derived from your lock screen password)? ...
Catomic's user avatar
  • 247
1 vote
1 answer
261 views

Storage access permissions before initial unlock upon startup

How do Android devices (at least all the non-enterprise personal devices I remember owning) display the wallpaper (usually chosen from the 'downloads' folder) on the lock screen when it first is ...
Chris Riddle's user avatar
3 votes
2 answers
4k views

What is Trusted Credentials in mobile phones?

My phone is encrypted and i was just playing with the configuration and just found a Trusted Credentials that got me curious on what it is and specially in one called Government Root Certification ...
Rafael Soares's user avatar

15 30 50 per page
1
2 3 4 5
10