You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Mar 1, 2022. It is now read-only.
This is Android Shared preference wrapper that encrypts the values of Shared Preferences using AES 128, CBC, and PKCS5 padding with integrity checking in the form of a SHA 256 hash. Each key is stored as a one way HA 256 hash. Both keys and values are base64 encoded before storing into prefs xml file. **By default the generated key is stored in the backing perferences file and so can be read and extracted by root user.** Recommend use the user password generated option as added in v0.1.0.
6
+
This is Android Shared preference wrapper that encrypts the values of Shared Preferences using AES 128, CBC, and PKCS5 padding with integrity checking in the form of a SHA 256 hash. Each key is stored as a one way SHA 256 hash. Both keys and values are base64 encoded before storing into prefs xml file. **By default the generated key is stored in the backing preferences file and so can be read and extracted by root user.** Recommend use the user password generated option as added in v0.1.0.
7
7
8
8
The sample app is available on [playstore](https://play.google.com/store/apps/details?id=com.securepreferences.sample)
9
9
@@ -13,19 +13,22 @@ The sample app is available on [playstore](https://play.google.com/store/apps/de
13
13
##New release v0.1.0
14
14
This release is a major refactor of the guts of secure prefs, which is *Not backwards compatible* yet with older versions. So if you have an existing app using this don't upgrade. I'll be looking to add migration into a later release.
@@ -88,8 +91,8 @@ SharedPreferences keys and values are stored as simple map in an XML file.
88
91
89
92
90
93
###Disclaimer
91
-
By default it's not bullet proof security (in fact it's more like obfuscation of the preferences) but it's a quick win for incrementally making your android app more secure. For instance it'll stop users on rooted devices easily modifiying your app's shared prefs.
92
-
*Recommend using the user password based prefs as introducted in v0.1.0.*
94
+
By default it's not bullet proof security (in fact it's more like obfuscation of the preferences) but it's a quick win for incrementally making your android app more secure. For instance it'll stop users on rooted devices easily modifying your app's shared prefs.
95
+
*Recommend using the user password based prefs as introduced in v0.1.0.*
93
96
94
97
95
98
###Contributing
@@ -119,4 +122,4 @@ Apache License, Version 2.0
119
122
limitations under the License.
120
123
121
124
122
-
Lock icon for sample app licenced under creativecommons created by Sam Smith via [thenounproject.com](http://thenounproject.com/term/lock/5704/)
125
+
The sample app Lock icon for sample app licenced under Creative Commons created by Sam Smith via [thenounproject.com](http://thenounproject.com/term/lock/5704/)
Copy file name to clipboardExpand all lines: changes.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
##Release Notes:
2
2
0.1.0
3
-
This release is a major refactor of the guts of secure prefs, which is *Not backwards compatible*yet with older versions. So if you have an existing app using this don't upgrade. I'll be looking to add migration into a later release.
3
+
This release is a major refactor of the guts of secure prefs, which is *Not backwards compatible* with 0.4.0 and older versions_yet!_. So if you have an existing app using this don't upgrade. I'll be looking to add migration into a later release.
4
4
5
5
* uses a new and stronger [Crypto library](https://github.com/scottyab/java-aes-crypto) under the hood
6
6
* includes PRNG fixes that effects JellyBean devices as per [google dev blog article](http://android-developers.blogspot.nl/2013/08/some-securerandom-thoughts.html)
@@ -9,11 +9,11 @@ This release is a major refactor of the guts of secure prefs, which is *Not back
9
9
* updated sample app
10
10
* removed test project and added tests as part of main project
11
11
* refactored library project to standard gradle structure
12
-
* published to maven central
12
+
* published to maven central/added github release
13
13
14
14
15
15
0.0.4
16
-
*Gralde support thanks @yelinaung
16
+
*Gradle support thanks @yelinaung
17
17
* Fix for OnPreferenceChanged listener @richardleggett
0 commit comments