Book Image

Testing and securing android studio applications

Book Image

Testing and securing android studio applications

Overview of this book

Table of Contents (18 chapters)
Testing and Securing Android Studio Applications
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Handling a user's data and credentials


The best way to handle a user's data and credentials is to minimize the use of this information. We should have access to the user data, store user data, or transmit user data only when it is completely necessary.

In the cases where handling user's data and credentials is necessary, there are some considerations that we should have as developers:

  • Consider using hash or nonreversible forms of data if the logic of your application allows it.

  • Do not expose user's data to other applications on the device. Try to make the interprocess communication as strict as possible. Programming with more flexible interprocess communication permissions can be more comfortable, but it can also be a huge vulnerability in your system.

  • Minimize the use of APIs that access sensitive information, especially when the information is personal data. Different APIs have different privacy policies and can even be malicious sometimes.

  • Make sure you understand what each and every piece...