Skype App Leaves Android Users Open to Attack

Status
Not open for further replies.
If nobody noticed the vulnerability Skype would have never done anything to fix that.

It should be every developers goal to create a safe and secure application right off the bat (not 100% secure, at least put "some" protection there).
 
Somehow I don't really see people that run any form of Google software or use any Google products caring much about their personal info winding up in the hands of "someone else." Just kinda' seems like a given to me.
 
[citation][nom]joytech22[/nom]If nobody noticed the vulnerability Skype would have never done anything to fix that.It should be every developers goal to create a safe and secure application right off the bat (not 100% secure, at least put "some" protection there).[/citation]
Maybe they didn't know, thats why they wouldn't have done anything.
 
[citation][nom]scotv453[/nom]Maybe they didn't know, thats why they wouldn't have done anything.[/citation]
I take that back. I didn't read it all.
 
Problem is that Skype has been working like this since its inception, it's just funny that no-one noticed.

Just download any SQLite reader and you can instantly view all the data since it's just in SQL code. It'll look something like this: http://images.kwokinator.com/web/skype-db-readable.png

It's just that no one cared until now to sift through Skype and find this exploit. Do however note that no other application can read main.db if Skype is running, so all a malware has to do is to kill the Skype process and then read the SQLite database. An easy fix would be to install the app, create a user on the phone, chown and chmod it to that Skype user. So that only the Skype app can read the db.
 
Status
Not open for further replies.