A small group of like-minded developers has introduced alpha version software that lets run Android applications on Windows.
The developer’s mission from the company BlueStacks is well expressed in a fun demo video, which can be viewed on the front page of the company: bluestacks.com/home.php. We strongly recommend watching the high quality demo.
When I read about the device fragmentation on Android, I mentally agree with the author. When I see theses that the device fragmentation prevents from the software development, I raise eyebrows perplexedly, but when somebody tries to prove me that the fragmentation of Android is the main problem of this platform and the main disadvantage for developers of mobile software, frankly, I start laughing. I am sorry, but this is a pure marketing nonsense or complete misunderstanding of the situation.
Let us imagine that you are a furniture manufacturer. You are working in the market of furniture products; you competing with other producers and dividing the entire market in some parts. As an entrepreneur your job to cut as much as possible the radial angle on a pie chart with the title “Furniture market share”. The pixels of this diagram are the people who buy the furniture. These are different people and they buy different furniture: starting from the unstained wooden beds from IKEA and ending with sofas that are upholstered in leather of young crocodiles from Caroline Islands that each costs as your apartment.
Two researchers from the University of California at Davis Hao Chen and Lian Cai found a way to determine, which keys have been pressed on the screen’s keypad of OC Android by measuring the shift of vibration and wobbliness of the device that were measured by the built-in accelerometer. This is important, because the data from the accelerometers were not considered as a potential vector of attack, and thus freely available to any application on any Smartphone or pad.
Eavesdropping of keylogging on a desktop or laptop computer with Windows or Mac is incredibly simple: install the appropriate program (or Trojan virus it will do for you), set up where it should be saved or sent the stolen key’s codes, and that is all! When it comes to Smartphones, however, the complex systems of access restrictions make this approach almost impossible unless the side-channels will be used. Strictly speaking, a side-channel is open source of information, which helps the attacker to crack the cryptographic system. In a broader sense, a side-channel may be a light indicator on the router that blinks during the data being transferred, or the keylogging’ sounds of a keypad. [Note: here were mention the real variety of attacks] In other words, the side-channels are characteristics of the system, which potential danger is overlooked.