Spoiler: sensitive work files are not stored encrypted beside the full disk encryption, which has been exploited with FROST:

https://www1.informatik.uni-erlangen.de/frost
http://www.extremetech.com/computing/150536-how-to-bypass-an-android-smartphones-encryption-and-security-put-it-in-the-freezer

And I didn't know that.

So everything is relying on bootloader security, that must be locked.

Via +Amon RA​​​

#supercurioBlog #security #encryption



Android for Work: Demystified
Android for Work has been announced by Google only some days ago and Google promises a secure but also usable way to combine sensitive company data and private data on a single device without incre…

Source post on Google+

Published by

François Simond

Mobile engineer & analyst specialized in, display, camera color calibration, audio tuning

5 thoughts on “Spoiler: sensitive work files are not stored encrypted beside the full disk encryption, which has been exploited with FROST:”

  1. Google basically cheated, they just create a new user account for the work profile.

    What they do also show why applications should not trust device's security and secure it's data itself… Most android mail clients store password in plain text, pretending it's useless to crypt them as if someone is root they will be able to access it, what they forget is if each application had it own crypting it would be long, and being able to root a device using a tutorial, or the same installing a new recovery won't make the villain suddenly able to code a key logger our something.

Leave a Reply