Security is the latest buzzword in town. The Android ecosystem ensures that our database is exposed to prying eyes; however, a rooted device can leave our database exposed, as we saw in Chapter 2, Connecting the Dots. With the help of a rooted device, an emulator and the adb pull
command in our case, we pulled our database for inspection with the SQLite manager tool. Another important aspect is content providers; we need to be careful while setting permissions. We should make the process of applying appropriate permissions compulsory in order to inform users about the control that an app establishes over data, using the contract
class.
In Chapter 3, Sharing is Caring, we briefly covered the topic of permissions in the Adding a provider to a manifest section. Let's elaborate a little more on this: