You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have searched and made sure there are no existing issues for the issue I am filing
I have searched the existing issues
Description
We've had white hat hackers test our system for vulnerabilities. One of the things they pointed out was the current use of "SharedPreferences" (Ti.App.properties).
It will store value2 inside the secret_share_prefs.xml file. The other value is stored in the normal titanium.xml
Just have to see if it should be a different setString like setStringSecure() so you could use both or if this way is better but then (at the moment) you can't get both values
m1ga
linked a pull request
Jun 18, 2023
that will
close
this issue
I have searched and made sure there are no existing issues for the issue I am filing
Description
We've had white hat hackers test our system for vulnerabilities. One of the things they pointed out was the current use of "SharedPreferences" (Ti.App.properties).
Solution
The hackers suggested we should use "EncryptedSharedPreferences" instead.
https://developer.android.com/reference/androidx/security/crypto/EncryptedSharedPreferences.
Alternatives
No response
Platforms
Android
The text was updated successfully, but these errors were encountered: