- Feb 02, 2016
-
-
Ernir Erlingsson authored
-
Ernir Erlingsson authored
-
- Feb 01, 2016
-
-
akwizgran authored
-
- Jan 29, 2016
-
-
akwizgran authored
-
- Jan 28, 2016
-
-
akwizgran authored
-
- Jan 27, 2016
- Jan 26, 2016
- Jan 21, 2016
-
-
Ernir Erlingsson authored
-
akwizgran authored
-
akwizgran authored
-
akwizgran authored
-
- Jan 20, 2016
- Jan 19, 2016
-
-
Torsten Grote authored
Since API 23 this is required for access to the Bluetooth APIs See: https://developer.android.com/intl/ko/about/versions/marshmallow/android-6.0-changes.html#behavior-hardware-id Closes #223
-
Torsten Grote authored
also run setting the default preferences in a background thread Closes #184
-
- Jan 18, 2016
-
-
Torsten Grote authored
Due to the nature of how Android app install/uninstall works without root, this requires manual confirmation after a panic was triggered. Closes #211
-
- Jan 15, 2016
-
-
Torsten Grote authored
-
Torsten Grote authored
-
Torsten Grote authored
-
- Jan 14, 2016
-
-
Torsten Grote authored
* Only show them as unread when they arrive out of order * Mark all messages as read when sending a message
-
- Jan 13, 2016
-
-
Torsten Grote authored
The method `runOnDbThread()` depends on an executor that's created by roboguice at startup. It requires to be signed in, so use a different thread instead.
-
akwizgran authored
-
akwizgran authored
-
- Jan 12, 2016
-
-
Torsten Grote authored
PanicKit does distinguish between two kinds of panic responses: * default responses such as logging out which are non-destructive and do not require user interaction, so that the basics work without configuration * destructive responses such as deleting user data. These require some sort of authentication to make sure they are not triggered by malicious apps The second type of responses is implemented with this commit. Authentication is done by comparing the package name which is very weak. It requires the user to opt-in to destructive responses and to configure from which app to receive those (since there might be many different panic trigger apps). While possible to uninstall an app and install one with the same package name afterwards, this always triggers notifications to the user (if the attacker does not have root access). Still that is no sufficient security for Briar's requirements, so that TrustedIntents are used as well to make sure that the app sending the destructive trigger is signed by a signing key that we specified before. Currently, that is the one from the GuardianProject and from IilabEngineering who does the Amnesty International Panic App. The responsibility of checking that the panic TRIGGER is legitimate lies with the app responding to the trigger, so Briar in this case. This commit checks whether the TRIGGER comes from a trusted app before performing destructive actions, but does perform the default action even when triggered from untrusted apps. Closes #210
-
Torsten Grote authored
This closes #204
-
- Jan 08, 2016
-
-
akwizgran authored
Also removed some unused code from BaseActivity.
-