177
edits
Line 67: | Line 67: | ||
=== App Host Compromise=== | === App Host Compromise=== | ||
Similar to the vulnerable web application case – a compromised server hosting a Web App would allow the attacker to execute actions on the phone with the permission of the compromised Web App. | Similar to the vulnerable web application case – a compromised server hosting a Web App would allow the attacker to execute actions on the phone with the permission of the compromised Web App. | ||
('''NOTE: THIS IS AN ASSUMPTION. The assumption in this case is that SSL (or other host-based PKI security) is to be deployed instead of GPG/PGP (or other people-based PKI security). in people-based PKI security, SERVER COMPROMISE IS IRRELEVANT. unless the store owner has been foolish enough to disregard basic security practices regarding keeping GPG private keys off of public-facing servers''') | |||
====Potential Countermeasures==== | ====Potential Countermeasures==== | ||
* Controls are largely the same as for vulnerable web applications - see above. | * Controls are largely the same as for vulnerable web applications - see above. |
edits