Scenario: Assume that when reverse engineering a .apk file, an attacker obtains a SENDER ID for the Push registration service used in the application. An attacker develops a similar fake application with the same / different package name and uploads to another application store other than Google Play.
My question is: Can it use the same SENDER ID with the application? What are the implications of this for the user who installs this fake application?
Related Questions: Google Cloud Messaging protection seems to be a bit similar. Also Android GCM answer : the same sender ID for the add-on application provides valuable information. Reading both accepted answers concludes that this is absolutely possible, and therefore it is recommended that you do not have sensitive data in push messages.
But this does not seem to solve the problem. I cannot understand the effect of the above security breach.
java android push-notification google-cloud-messaging
Shobhit Puri Aug 12 '13 at 20:39 on 2013-08-12 20:39
source share