Top Secure Android Smartphones to Consider

Top Secure Android Smartphones to Consider

Recently, many people have been bombarded by an advertisement: “Safety first in life and work, Gionee M6 Secure Phone, with built-in encryption chip.” Typically, digital products endorsed by Feng Xiaogang are sure to have short-term business opportunities, just like the e人e本 from years ago. Therefore, the concept of secure phones must have already gained some … Read more

How to Optimize Android Battery Usage

How to Optimize Android Battery Usage

New Media Manager Click on the top “Programmer Co-Reading“, select “Top Public Account” At critical moments, deliver first! Calculating and counting battery consumption is a troublesome and contradictory task. Recording battery consumption itself is also a power-consuming activity. As the performance requirements of Android increase, battery optimization becomes particularly important. An application that consumes too … Read more

Enhancing Work Efficiency with Outstanding Android Open Source Projects

Enhancing Work Efficiency with Outstanding Android Open Source Projects

❝ I recently watched a live stream by Liu Wangshu on a video platform. One sentence left a deep impression on me: “Stop working on UI, there’s no future in it.” I agree with him 99%, leaving 1% for those who can stand out in the Android UI field. In the early stages of Android … Read more

A Comprehensive Guide to Android Root Detection and Bypass

A Comprehensive Guide to Android Root Detection and Bypass

0x01 Introduction Android is based on the Linux multi-user access control mechanism. By default, applications cannot execute other applications, including reading and writing users’ private data. The process of an application is a secure sandbox (running the application in a restricted security environment, with all changes in the sandbox having no harm to the operating … Read more

Introduction to White-Box Encryption for Android Applications

Introduction to White-Box Encryption for Android Applications

0x00 Background The expert ys often mentions white-box encryption, but I never quite understood what it is. I took some time to summarize the principles of white-box cryptography on Android and related case analyses of cracking. White-Box Attacks A white-box attacker has complete control over the terminal, allowing them to observe and modify the program’s … Read more

Understanding Android Garbage Collection and Memory Leaks

Understanding Android Garbage Collection and Memory Leaks

(Click the public account above to quickly follow) Source: BlackSwift http://www.jianshu.com/p/8c6cf3d7a98a If you have good articles to submit, please click → here to learn more Android system runs on the Java virtual machine, and as an embedded device, memory is often very limited. Understanding the garbage collection mechanism of Android can effectively prevent memory leak … Read more