Are SqlCipher open cursors a security concern?

Posted by user1178479 on Stack Overflow See other posts from Stack Overflow or by user1178479
Published on 2012-03-30T17:26:01Z Indexed on 2012/03/30 17:29 UTC
Read the original article Hit count: 185

Filed under:
|
|

I'm using SqlCipher with content providers. Right now, when I want to lock the app I just clear out the cached password. However, the app can continue to work with any open cursors. This means that re-opening the app grants access to the sensitive data. I fix this issue on the surface by redirecting to a login screen if the app doesn't have passwords.

However, I'm concerned if there are any security issues with these open cursors or if I should just continue to block UI access and not worry? SqlCipher's docs say that it reads/writes encrypted pages on the fly, as opposed to decrypting the entire DB, this makes me think that open cursors are still secure.

The main concern here is that someone loses their phone and then a knowledgeable individual can use these open cursors to extract sensitive data.

© Stack Overflow or respective owner

Related posts about android

Related posts about commonsware