diff options
author | Parménides GV <parmegv@sdf.org> | 2014-04-09 12:13:09 +0200 |
---|---|---|
committer | Parménides GV <parmegv@sdf.org> | 2014-04-09 12:13:09 +0200 |
commit | 6543f487c993002d5cc9cb4cec8e45f638d15be9 (patch) | |
tree | 4652e074df704417feb5450fb80477d49f7cc5bc /bitmask_android/src/main/res/values | |
parent | 3ef75e60fef1f16d6a97c3b4ad80c45e362b82ef (diff) |
Danger code removed from release apk.
I've copied all files containing "danger" to both release and debug java folders (solution learnt from http://stackoverflow.com/questions/18782368/android-gradle-buildtypes-duplicate-class), and removed every trace of any "danger" related code in the release apk.
This way, we make sure nobody can exploit that unused variable in production mode, so that if Android fails to protect our app (people have been able to introduce code into signed apks, so it's not impossible), we make it difficult to bypass the SSL certificate verification. You can call me paranoid if you want ;)
Diffstat (limited to 'bitmask_android/src/main/res/values')
-rw-r--r-- | bitmask_android/src/main/res/values/strings.xml | 1 |
1 files changed, 0 insertions, 1 deletions
diff --git a/bitmask_android/src/main/res/values/strings.xml b/bitmask_android/src/main/res/values/strings.xml index bcb6ecc9..492c48c7 100644 --- a/bitmask_android/src/main/res/values/strings.xml +++ b/bitmask_android/src/main/res/values/strings.xml @@ -116,7 +116,6 @@ <string name="error_no_such_algorithm_exception_user_message">Update the app</string> <string name="login_button">Log In</string> <string name="logout_button">Log Out</string> - <string name="danger_checkbox">Skip security check</string> <string name="setup_error_title">Configuration Error</string> <string name="setup_error_configure_button">Configure</string> <string name="setup_error_close_button">Exit</string> |