[Arriba] [Todas las Listas]

[android-developers] Re: Robando un apk wirelessly

To: Android Developers <android-developers@xxxxxxxxxxxxxxxx>
Subject: [android-developers] Re: Robando un apk wirelessly
From: Hal Harrison <closeenough.backup@xxxxxxxxx>
Date: Wed, 30 Nov 2011 20:26:25 -0800 (PST)
Delivery-date: Wed, 30 Nov 2011 23:26:47 -0500
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=beta; h=x-beenthere:received-spf:mime-version:date:in-reply-to:references :user-agent:x-http-useragent:message-id:subject:from:to :x-original-sender:x-original-authentication-results:reply-to :precedence:mailing-list:list-id:x-google-group-id:list-post :list-help:list-archive:sender:list-subscribe:list-unsubscribe :content-type; bh=ubPL9ZpunCEYLahpApzllmHOkEvr6kUw4v1Zuimp7C0=; b=Yt4RrSekHHpgpbCanB5nwnwCen+96wDCIiU8bfUumh7Ax/459/KxRiZP9Lrg5GQkyW 1Dt1CJpwwtMeTOiI6Ck77zsf1PTI/sNDnob/2b4CEDSM/uV7xJi5vKdXI31SeLIeRlgy yxKk3Mn8kkXmIXP5UXALzyGME1yS47Of1L7h4=
Envelope-to: traductor@xxxxxxxxxxx
In-reply-to: <>
List-archive: <>
List-help: <>, <>
List-id: <>
List-post: <>, <>
List-subscribe: <>, <>
List-unsubscribe: <>, <>
Mailing-list: list android-developers@xxxxxxxxxxxxxxxx; contact android-developers+owners@xxxxxxxxxxxxxxxx
References: <> <>
Reply-to: android-developers@xxxxxxxxxxxxxxxx
Sender: android-developers@xxxxxxxxxxxxxxxx
User-agent: G2/1.0

> Cómo  crees que esto sería cumplido?

Para caso, por la corrupción/*enhancement de cualquier *handshaking
va en cuándo un teléfono listo introduce un caliente-sitio. Si un teléfono listo puede
*compromise un desprotegido local *wireless red, podría no el
*converse ocurre? Qué la diferencia entre *Android Depura el Puente que
accede el teléfono de #mío amigo *via el *USB cable y *via *wireless? Es
*deselecting '*Unknown Fuente' protección segura?

*Hal Harrison.

Recibiste este mensaje porque eres *subscribed al *Google
Grupos "*Android *Developers" grupo.
A correo a este grupo, envía *email a *android-developers@xxxxxxxxxxxxxxxx
A *unsubscribe de este grupo, envía *email a *android-*developers+unsubscribe@xxxxxxxxxxxxxxxx

Puesto que más opciones, visita este grupo en

> How do you believe this would be accomplished?

For instance, by the corruption/enhancement of whatever handshaking
goes on when a smart phone enters a hot-spot. If a smart phone can
compromise an unprotected local wireless network, couldn't the
converse occur? What's the difference between Android Debug Bridge
accessing my friend's phone via the USB cable and via wireless? Is
deselecting 'Unknown Source' secure protection?

Hal Harrison.

You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to android-developers@xxxxxxxxxxxxxxxx
To unsubscribe from this group, send email to
For more options, visit this group at

<Anterior por Tema] Tema Actual [Siguiente por Tema>