The Android operating system was designed in anticipation of hackers attempting to perform common attacks, such as social engineering attacks that try to trick the user into handing over their personal information or installing malware.
Android comes with built-in security features that significantly reduce the chances of security exploits succeeding, and that limit the impact of any attacks that do succeed.
These built-in security controls provide you, your application, and your users with a certain level of protection by default. Nevertheless, following security best practices is essential for further reducing the chances of your app leaving users vulnerable to exploits, data leaks, and other security-related issues.
In this chapter, we're going to look at how you can make the most of Android's built-in security features. Towards the end of this chapter, I'll also look at some best practices we haven't covered in detail in any of the...