Overview
Syllabus
Introduction
Outline
Key Words
Sample App
Secure Password wrapper
Secure Password helper
How far do I want to go
Dont touch me like that
Network Security
Android Keystore
How does this work
Keystore
Lock Screen Flow
Challenges
Remove Fingerprints
How do you use it
What is insecure hardware
How to generate a key
How to generate a private key
Steps
First Check
Fingerprints
Authentication callback
Authentication result
Previous slide
Exceptions
Key Management
Good and Bad
No Control
No Keystore
Big Integers
Secret Keys
The Story
The Secret Key
Storage
Summary
Round Keys
Bounce Call
Android Know How
Taught by
Cooper