4. Network Communication

In this chapter we look at how to encrypt data and how to send information securely across the network using SSL. We also look at how hackers might perform a man-in-the-middle (MITM) attack using an SSL proxy, which intercepts the communication to see whether it’s really secure. In Chapter 2 we talked about the pros and cons of storing any sensitive data on the phone or tablet; generally, it’s not a good idea and should be avoided if possible. A better solution is to store the data remotely where it’s away from prying eyes.

However, when you send the data to a remote server you have to be careful that it’s encrypted when you are sending it. This could be done using SSL, and you can also encrypt it on one end yourself ...

Get Bulletproof Android™: Practical Advice for Building Secure Apps now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.