How to Keep Your Secrets Safe - Alternatives to 'Just Don't' on an Android Device

How to Keep Your Secrets Safe - Alternatives to 'Just Don't' on an Android Device

Cooper via YouTube Direct link

Challenges

14 of 39

14 of 39

Challenges

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

How to Keep Your Secrets Safe - Alternatives to 'Just Don't' on an Android Device

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Outline
  3. 3 Key Words
  4. 4 Sample App
  5. 5 Secure Password wrapper
  6. 6 Secure Password helper
  7. 7 How far do I want to go
  8. 8 Dont touch me like that
  9. 9 Network Security
  10. 10 Android Keystore
  11. 11 How does this work
  12. 12 Keystore
  13. 13 Lock Screen Flow
  14. 14 Challenges
  15. 15 Remove Fingerprints
  16. 16 How do you use it
  17. 17 What is insecure hardware
  18. 18 How to generate a key
  19. 19 How to generate a private key
  20. 20 Steps
  21. 21 First Check
  22. 22 Fingerprints
  23. 23 Authentication callback
  24. 24 Authentication result
  25. 25 Previous slide
  26. 26 Exceptions
  27. 27 Key Management
  28. 28 Good and Bad
  29. 29 No Control
  30. 30 No Keystore
  31. 31 Big Integers
  32. 32 Secret Keys
  33. 33 The Story
  34. 34 The Secret Key
  35. 35 Storage
  36. 36 Summary
  37. 37 Round Keys
  38. 38 Bounce Call
  39. 39 Android Know How

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.