diff options
author | Parménides GV <parmegv@sdf.org> | 2014-04-09 12:13:09 +0200 |
---|---|---|
committer | Parménides GV <parmegv@sdf.org> | 2014-04-09 12:13:09 +0200 |
commit | 6543f487c993002d5cc9cb4cec8e45f638d15be9 (patch) | |
tree | 4652e074df704417feb5450fb80477d49f7cc5bc /app | |
parent | 3ef75e60fef1f16d6a97c3b4ad80c45e362b82ef (diff) |
Danger code removed from release apk.
I've copied all files containing "danger" to both release and debug java folders (solution learnt from http://stackoverflow.com/questions/18782368/android-gradle-buildtypes-duplicate-class), and removed every trace of any "danger" related code in the release apk.
This way, we make sure nobody can exploit that unused variable in production mode, so that if Android fails to protect our app (people have been able to introduce code into signed apks, so it's not impossible), we make it difficult to bypass the SSL certificate verification. You can call me paranoid if you want ;)
Diffstat (limited to 'app')
0 files changed, 0 insertions, 0 deletions