Chapter 4

Concepts in Action – Part 1

In this chapter, we will merge together all the topics we discussed in the previous chapters. If you recall, we discussed the Proxim application, through which we looked at data encryption. We will analyze its source code in detail here. We will also work through some examples of applications that require and use permissions.

The Proxim Application

The Proxim project should have a structure similar to that depicted in Figure 4-1

9781430240624_Fig04-01.jpg

Figure 4-1.  The Proxim Application structure

Let’s start with the Activity, which is where your programs usually will start (see Listing 4-1). In the Activity, we are creating ...

Get Android Apps Security now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.