我的手机目前不起作用。三星让我在批准的维修中心将其删除,这将处理往返三星的发货和接待。
无法启动我的手机,我不可能从中删除个人文件。
我知道,一旦修复,任何处理手机的人都可以访问所有文件。但我的密码怎么样?我知道可以通过root访问权限保存WiFi密码。来自应用程序的密码也是可能的吗? (Gmail,Dropbox,来自Chrome的网站密码......)
底线:如何安全是 UN 加密设备上的数据/密码?
我的手机目前不起作用。三星让我在批准的维修中心将其删除,这将处理往返三星的发货和接待。
无法启动我的手机,我不可能从中删除个人文件。
我知道,一旦修复,任何处理手机的人都可以访问所有文件。但我的密码怎么样?我知道可以通过root访问权限保存WiFi密码。来自应用程序的密码也是可能的吗? (Gmail,Dropbox,来自Chrome的网站密码......)
底线:如何安全是 UN 加密设备上的数据/密码?
My phone is currently inoperative. Samsung asked me to drop it at an approved repair center, which will handle shipment and reception to/from Samsung.
Being unable to boot my phone, it was impossible for me to remove personal files from it.
I am aware all my files will be accessible to anyone handling my phone, once repaired. But what about my passwords ? I know it's possible to get saved WiFi passwords with root access. Is it possible too for passwords from applications ? (Gmail, Dropbox, Website passwords from Chrome, ...)
Bottom line: How safe are my data/passwords on an unencrypted device ?
作为 andro nerd 在他的答案,最多应用程序存储密码(和其他敏感信息)加密。有些人甚至不存储它们(他们使用一种"令牌" ,因为大多数Google Apps都可以使用,或者他们不存储那样的东西)。
不幸的是,只有大多数应用程序似乎在乎。有些商店一切普通文本(某些HTC设备上的库存电子邮件应用程序为例,例如:存储密码甚至目录信息纯文本以进行交换服务。该指控的来源可以在下面提到的书中找到)。很难真正的知道哪个应用程序是保存的,尽管有些服务可以帮助您解决它 - 请参阅例如Viaforensic的 appwatchdog ,他们彻底调查了这样的东西(但有限的Ressources是 / em>从覆盖一切)。某些安全博客也通知了发现的问题 - 如果某些知名的应用程序受到这种安全漏洞的影响(例如提到的电子邮件应用程序,或 skype ),世界上所有的博客都将传播字。
了解结构如何保存数据,您可以调查自己(如果您的设备植根于此)。 Andrew Hoog的书 Android取证和移动安全性是一个教授你如何的好源这样做:
应用程序将其数据存储在 /data/data
中的数据,其中包含应用程序包名称的目录(对于skype,这将是 /data/data/com.skype.merlin_mecha/
)。默认情况下,仅通过应用程序访问该目录(当然,当然,root) - 这就是为什么它需要root权限挖掘更深入。以下基本结构如下:
/data/data/com.example.demoapp ├── cache Directory │ └── webviewCache Directory │ ├── 027e59a0 Cache file │ └── 057606c4 Cache file ├── databases Directory │ └── example.db SQLite database ├── lib Directory └── shared_prefs Directory └── example.xml Config file
显然,有两个主要的地方来检查:
shared_prefs
目录,包含XML文件。因为那些是纯文本,他们应该容易调查。 databases
目录。数据库文件通常在SQLite标准中,因此您可以使用SQLite命令行客户端调查它们,或者使用 sqliteman等图形前端。关于这个主题的彻底信息将在这里走得太远 - 但是你有希望。
我不会那么关心三星官方服务(虽然"坏人" 可以坐在任何地方 - 但是一个人不应该绕过偏执狂。但当然是一个普遍的想法,以小心为什么小心一个用途。对于您目前的情况来说太晚了,可能是 - 但总是有明天。
As The Andro Nerd pointed out in his answer, most apps store passwords (and other sensitive information) encrypted. Some even don't store them at all (they use a kind of "tokens", as is available with most Google apps -- or they don't store anything like that).
Unfortunately, only most apps seem to care this way. Some store everything plain text (the stock email app on some HTC devices is known for that, for example: Storing passwords and even directory information plain text for Exchange services. Sources for this allegation can be found in the book mentioned below).
It's hard to really know which apps are save, though some services help you figure it out -- see e.g. ViaForensic's AppWatchdog, where they thoroughly investigate apps for things like that (but with limited ressources are far from covering everything). Some security blogs inform about found issues as well -- and if some well-known app is affected by such a security hole (as e.g. mentioned email app, or Skype), all the blogs in the world will spread word.
Knowing the structures how data are saved, you could investigate yourself (if your device is rooted, that is). Andrew Hoog's book Android Forensics and Mobile Security is one good source teaching you how to do that:
Apps store their data below the /data/data
, in a directory with the apps package name as name (for skype, this would be /data/data/com.skype.merlin_mecha/
). By default, that directory is accessible by the app alone (and, of course, by root) -- which is why it requires root privileges to dig deeper. The basic structure below is as follows:
/data/data/com.example.demoapp xe2x94x9cxe2x94x80xe2x94x80 cache Directory xe2x94x82 xe2x94x94xe2x94x80xe2x94x80 webviewCache Directory xe2x94x82 xe2x94x9cxe2x94x80xe2x94x80 027e59a0 Cache file xe2x94x82 xe2x94x94xe2x94x80xe2x94x80 057606c4 Cache file xe2x94x9cxe2x94x80xe2x94x80 databases Directory xe2x94x82 xe2x94x94xe2x94x80xe2x94x80 example.db SQLite database xe2x94x9cxe2x94x80xe2x94x80 lib Directory xe2x94x94xe2x94x80xe2x94x80 shared_prefs Directory xe2x94x94xe2x94x80xe2x94x80 example.xml Config file
Obviously, there are two major places to check:
shared_prefs
directory, containing XML files. As those are plain-text, they should be easy to investigate.databases
directory. Database files are usually in the SQLite standard, so you can investigate them with either an SQLite command line client, or with a graphical frontend like SQLiteMan.A thorough information on this topic would go too far here -- but you got the idea, I hope.
I wouldn't be that much concerned with Samsungs official service (though "bad guys" could sit everywhere -- but one should not go paranoid about it. But of course it is a generally good idea to be careful of which apps one uses. Too late for your current case, might be -- but there's always a tomorrow.
大多数(如果不是全部)应用程序将以其数据文件夹中的数据库中的加密格式存储已保存的密码。
因此,您的密码将是安全的 - 它们必须访问数据库,然后解密存储的加密密码。
以及它们最有可能擦拭设备(并非总是完成,取决于修复)。
Most (if not all) applications will store saved passwords in an encrypted format in their database in their data folder.
As such, your passwords will be safe - they would have to access the database, and then decrypt the stored the encrypted password.
As well as that, they will most likely wipe your device anyway (not always done, depends on the repair).
© 2022 it.wenda123.org All Rights Reserved. 问答之家 版权所有