• How to find out the password for VK on Android - find everything that is hidden. Properly storing Android passwords using KeePassDroid

    This situation often happens when your smartphone is connected to WiFi networks, but you don’t remember what password you entered. As a result, you seem to have access to WiFi, but you can no longer connect another device (for example, a tablet) to it. Fortunately, there is a simple way out of this situation. You can view the WiFi password on an Android device that is already connected to wireless network. In this article we will tell you how this can be done.

    The first thing that needs to be said is that the described method will only work on devices with ROOT access. In order to view the WiFi password on Android you need ROOT access, since this information is stored in a protected area internal memory devices.

    So, if you are interested in how to view the WiFi password on Android, then you need to download and install the Root Browser application. And with the help this application you need to go to the data folder.

    And open the wifi folder. This is the last step up the directory tree.

    Once you open the wifi folder, you will see a list of files. In order to view the WiFi password on Android, we need to open the file called wpa_supplicant.conf. You can open it in any text editor.

    After opening of this file you will see all the information about the WiFi networks to which you connected your Android device.

    In file wpa_supplicant.conf information about each WiFi network is highlighted in a block with the heading “network”. This block has a number of parameters. We are most interested in two of them. This ssid– the name of the wireless network, and psk– password for accessing the network. By copying the password from here you can reconnect to WiFi.

    If this method seems too complicated for you, or you are just too lazy to go through catalogs and search required file, then you can simply download and install the WiFi Key Recovery program. As in the previous case, for this application to work you need

    Articles and Lifehacks

    Everyone knows what's in the depths mobile device you can find the section where are passwords stored in android?. However, many people think that these passwords just hang there. open access, and if the phone is lost, someone will be able to use the account by simply opening the “account.db” folder. In fact, this is a huge misconception. This is much more difficult than, since everything is tied to the hardware.

    When you sign up for Google, you enter your email address and password. Your device then transmits to the server imei code, which is unique for all phone models, and in return receives an authorization token (auth token). This token will be valid only for your phone and it is this token, not the account password, that will be located in the account.db folder.”

    If you lose a device that has been registered, you can log into your Google account, for example, from a computer and disable it. Now no one can enter your personal account from a lost device.

    Saved passwords in the Android browser

    Taking advantage mobile internet, we often visit sites where registration is required, and to save time we click the “Remember” button. At the same time, we don’t think about where the passwords that we specify are stored in Android. And they are saved in the browser we use, for example, Opera mini. And if available necessary programs this data is easy to view. And for this it is not at all necessary to know, everything is made simpler.

    To see your saved passwords, you will need special program, providing administration rights. It could be Universal Androot or any other similar service. You also need to download the SQLite Editor application and run it. When you first launch it, the program will probably scan your device for the presence of a database, after which it will display a list of applications that will have their own database. Find the browser you use in the list and click on it. Now a menu will appear in front of you, in it you need to select “webview. db". In the “password” window that appears, you can find all the passwords that have been saved in the browser.

    Is it possible to hide passwords in Android

    You are unlikely to be able to hide saved passwords. Therefore, if someone else besides you has access to your mobile device, then follow these rules:

    1) Opt out of the “Remember” option when registering a new account.
    2) After each visit to Internet pages, delete your browsing history.
    3) Clear your cache at least once a week.

    If you have forgotten your network pass and because of this you cannot connect other devices to it, and you do not have access to your computer, our instructions on how to view the WiFi password on Android will help you.

    With their help you can find out everything necessary information, having only a smartphone or tablet with you Android control OS.

    Method 1: Browse using the file system

    Most quick way To find out a code word is to look at it using the system of a mobile gadget.

    Please note that this method can only be performed if the smartphone was previously connected to a specific router.

    Android works on the same principle as Unix systems. The basis for constructing all system functions are individual configuration indicators, which contain the necessary operating system settings.

    All of them are also stored in certain configuration options. Any user who has the following installed on their phone can view them. root rights.

    In OS versions without superuser rights, users will not be able to view system configurations. Follow the instructions:

    • Go to Explorer. It is recommended to use Total File Commander or ES File Explorer, since these programs are able to display all types of data that are in the device’s memory;
    • In the main Explorer window, select “Phone built-in memory” (not SD card);
    • Go to the directory data/misc/wifi/;
    • In the folder that opens, find wpa_supplicant.conf. In more earlier versions On Android OS, it may have names consisting only of numbers, so just open several objects with the .CONF extension until you find a document with the desired content.

    Open the found file. Its contents will appear in the console as follows:

    The file contains the network name and all the parameters necessary for the connection.

    The “PSK” line indicates the password value. In this case, code word to connect to the Wi-Fi network WLAN_P6 will be “abcdoorioo”.

    It will indicate the parameters for all routers ever connected to the phone.

    Method 2: Using a Browser

    This method does not require superuser rights on the smart device.

    To complete the task, you only need a browser and a connection to the global network.

    This method is similar to how you can view Wi-Fi data on a regular computer.

    Follow the instructions:

    • Connect to the router you want to access;
    • Now open your browser. We recommend using Chrome, Opera or Firefox. These browsers are able to easily display all the features of the settings window of different Wi-Fi models;
    • In the address bar, enter the local host address 127.0.0.1 or 127.0.0.0. Various models can use any of two addresses, so enter them one by one until the authorization window appears in the browser (terms “login” and “password”);
    • Enter login– admin and password– admin. If the login data pair does not match, look desired value on the bottom panel of the router and try again;
    • After successful authorization in the browser, the settings window will open. Go to the “Security” tab. There you can view the key and change it.

    Please note that opening the settings in your browser will help you change existing key and a number of other router settings only using a smartphone or tablet.

    Method 3: Using third-party programs

    You can view the configuration of individual networks using third-party programs.

    They allow you not to search system files on one's own. All necessary information it will be presented in the appendix and conveniently presented in table form.

    WiFi Key Recovery is one such utility. The main window of the application displays information about the name of the smartphone manufacturer and exact time last update configuration files.

    The utility opens information about Wi-Fi automatically. The user can find a specific connection using text field to search.

    Just enter your name required network, so that it rises to the first place in the list of connections.

    Each connection is divided into separate blocks, each of which has the following parameters:

    • SSID– the name of the previously used router;
    • PSK– the required password string;
    • KEY MGMT– the name of the type of encryption that is used in a particular network.

    Viewing the Wi-Fi key on Android will allow you to quickly find out information for logging into the router’s network.

    This way, you can connect other gadgets without using a computer to view the key.

    Thematic videos:

    Let's imagine the following situation. We find a smartphone running Android 4.1–4.4 (or CyanogenMod 10–11) and instead of returning it to the owner, we decide to keep it and extract all the confidential information we can from it. We will try to do all this without specialized tools like various systems to directly take a dump from NAND memory or hardware devices to remove S-ON and so that the owner does not know what we are doing and cannot remotely find or block the device. Let me make a reservation right away that this is not a guide to action at all, but a way to explore the security of smartphones and provide information to those who want to protect their data.

    WARNING!

    All information is provided for informational purposes only. Neither the author nor the editors are responsible for any possible harm caused by the materials of this article.

    Priority actions

    So, we got our hands on someone else’s smartphone. It doesn’t matter how, it’s important that we already have it. The first thing we must do is to untie him from cellular network, that is, following the commandment of the Gopniks, remove and throw away the SIM card. However, I would recommend doing this only if the SIM card can be removed without turning off the smartphone, that is, either by carefully lifting the battery, or through the side slot, if it is a smartphone with non-removable battery(Nexus 4/5, for example). In all other cases, it is better to limit yourself to turning on airplane mode, since it is quite possible that the encryption mode for user data is activated in Android and, after turning it off, the smartphone will be locked until the encryption key is entered.

    Also, under no circumstances should you connect your smartphone to any Wi-Fi networks, since perhaps the tracking software installed on it (and it’s already built into Android 4.4.1) will immediately begin its work and you can run into a “chance” meeting with the owner and his friends (you don’t have to worry about the police, they’re such a victim will send). Front camera I would tape it with something just in case, perhaps she is taking pictures now and they will be sent at the first opportunity.

    Lock screen

    Now that we have secured our person, we can begin the excavations. The first obstacle we'll have to get around is the lock screen. In 95% of cases it will not have protection, but we cannot forget about the remaining five percent.

    There are three main types of secure lock screen in Android. This is a four-digit PIN code, a pattern or a face photo. To unlock the first two, a total of twenty attempts are given, divided into five pieces with a “minute of rest” between them. There are several attempts to unlock using a face photo, after which the smartphone switches to a PIN code. In all three cases, after all attempts fail, the smartphone is blocked and asks Google password.

    Our task is to try to bypass the lock screen so as not to fall back on the Google password, which we definitely won’t be able to guess. The easiest way to do this is using a USB and ADB connection:

    $ adb shell rm /data/system/gesture.key

    Or like this:

    $ adb shell $ cd /data/data/com.android.providers.settings/databases $ sqlite3 settings.db > update system set value=0 where name="lock_pattern_autolock"; > update system set value=0 where name="lockscreen.lockedoutpermanently"; >.quit

    However, this method has two problems. It requires root rights and will not work in Android 4.3 and higher, since access to ADB requires confirmation from the device, which is impossible to do when the screen is locked. Moreover, ADB access can be disabled in the settings.

    We can go down a level and use the recovery console to delete the lock key file. To do this, just reboot into the recovery console (switch off + power on while holding down the volume up key) and flash the following file. It contains a script that will delete /data/system/gesture.key and remove the lock without disrupting the current firmware.

    The problem with this approach is the dependence on a custom recovery console. The stock console simply will not accept the file as signed incorrectly digital signature. In addition, if data encryption is activated, during the next boot the phone will be locked and only complete removal all data that runs counter to our task.

    Even more low level- this is fastboot, that is, manipulation of the device at the bootloader level. The beauty of this method is that the unlocked bootloader allows you to do anything with the device, including downloading and installing a custom recovery console. To do this, just turn off the smartphone (again, we make allowances for data encryption) and turn it on in bootloader mode using the power button + “volume down”. After this, you can connect to the device using the fastboot client:

    $fastboot devices

    Now download the “raw” image of the custom recovery console (from img extension) for “our” device and try to download it without installation:

    $ fastboot boot cwm-recovery.img

    If the bootloader of the device is unlocked, the smartphone will reboot into the console, through which you can activate the ADB mode, use it to download the “update”, the link to which is given above, and flash it. Next, it will be enough to reboot to get full access to a smartphone. By the way, if you become the owner of one of the Nexus devices, you can easily unlock its bootloader like this:

    $ fastboot oem unlock

    But this is just food for thought, since the unlocking operation automatically resets the device to factory settings.

    Now let’s talk about what to do if all these methods don’t work. In this case, you can try to find a bug in the lock screen itself. Surprisingly, despite the absence of such in pure Android, they are quite often found in the lock screens of branded firmware from the manufacturer. For example, in Galaxy Note 2 and Galaxy S 3 based on Android 4.1.2, a funny bug was once found that allowed short time access the desktop by simply clicking the " Emergency call", then the ICE button (bottom left in the dialer) and finally the Home button. After this, the desktop appeared for literally half a second, which was quite enough to remove the lock.

    An even dumber bug was found in the Xperia Z: you could dial a code on the emergency dialer to enter the engineering menu ( # #7378423## ), use it to get to the NFC Diag Test menu and then exit to the desktop by the same press of the “Home” button. It’s very difficult for me to imagine how such wild bugs could appear, but they exist.

    Regarding the bypass graphic key, everything is quite simple here. It can be disabled in the same way as the pin code, but there are two more additional features. Firstly, even despite the impressive number possible options keys, people, due to their psychology, most often choose a key that is similar to one of the letters of the Latin alphabet, that is, the same Z, U, G, number 7, and so on, which reduces the number of possibilities to a couple of dozens. Secondly, when entering a key, your finger leaves a not at all illusory mark on the screen, which, even blurred, is quite easy to guess. However, the last minus can be easily offset by a protective matte film, on which marks simply do not remain.

    Well, the last thing I would like to talk about is the so-called face control. This is the most clumsy blocking option, which, on the one hand, is very easy to bypass by simply showing the smartphone a photo of the owner, but on the other hand, it is quite difficult, since without even knowing the owner’s name, it is not possible to get his photo. Although it's certainly worth trying to take a photo of yourself, it's quite possible that you look like the previous owner.

    Inside

    Let's say we bypassed the lock screen. Now our actions will be aimed at getting as much information as possible from the smartphone. Let me make a reservation right away that the password for Google, services like Facebook, Twitter and the number credit cards we won't get it. Neither one nor the other is simply available on a smartphone; instead of passwords, authentication tokens are used, which provide access to the service only with of this smartphone, and the latter are stored on the servers of the corresponding services ( Google Play, PayPal), and the same tokens are used instead.

    Moreover, you won’t even be able to buy something on Google Play, since it latest versions force you to ask for your Google password every time you make a purchase. This function, by the way, can be disabled, but even in this case the meaning of purchases will be lost, since all the content will be tied to someone else’s account.

    On the other hand, we may well, if not hijack accounts completely, then at least read the user’s mail, Facebook and other personal information, and there may already be something interesting there. In this case, Gmail will give a special profit, which can be used to restore your account to other services. And if the user has not yet had time to go to a communication store to block the SIM card, then it will be possible to confirm his identity using the phone number. But you should only do this after disabling all security mechanisms (we don’t want to be tracked using anti-theft).

    Removing anti-theft

    All applications for tracking smartphones running Android can be divided into three groups: “trash”, “toys” and “pull”. The first ones are distinguished by the fact that they were written by technical school students in three hours and, in fact, represent the most regular applications, who can take data from a position sensor and send it to an unknown location. The special beauty of such software is that they are very easy to detect and remove. In fact, just go through the list installed software, enter incomprehensible names into the search, identify anti-theft software and remove them. This is exactly what needs to be done at the first stage.

    The second type of application is something that claims to be a serious tool, but in reality is not one. Typically, such software can not only send coordinates to a remote server, but also hide itself and protect itself from deletion. The second function is usually implemented by creating the application as a service without GUI. In this case, its icon will not be visible in the list of applications, but the application itself, of course, will hang in the background, which is easy to determine using any process manager.

    Protection against deletion in such “software” is usually implemented by registering yourself as a device administrator, so the second action you need to take is to go to “Settings -> Security -> Device Administrators” and simply uncheck all the applications listed there. The system should request a PIN code or password, but if it is not already on the lock screen, then access will be granted immediately. It's funny, but Google's anti-theft, which is actually built into the OS, is disabled in exactly the same way.

    Finally, the third type of application is anti-theft, which was programmed by people. The main difference between such applications is that in addition to disguise, they can also register themselves in the /system partition (if there is root), which is why you should delete them standard means becomes impossible. The only trouble is that they will still be visible in the list of processes, and to disable them, just go to “Settings -> Applications -> All”, then click on the desired application and click the “Disconnect” button.

    That's all the protection is. This list should also include normal applications, implemented as a kernel module or at least a native Linux application, which is not standard manager It won’t show any processes, but for some reason I haven’t seen anything like this yet. On the other hand, the ps and lsmod commands would still expose them (unless it was a proper backdoor), so the level of stealth would not increase much.

    Root and memory dump

    The next step is to take an internal memory dump. We cannot be sure that there are no bookmarks left on the phone, especially if it proprietary firmware from HTC and Samsung, so before turning on the network it is better to save all its data on our hard drive. Otherwise, they may be deleted as a result of a remote dump.

    For this purpose in mandatory you need root rights (unless, of course, the phone is not rooted yet). How to get them is the topic of a separate article, especially since each smartphone has its own instructions. The easiest way is to find them on a thematic forum and perform them by connecting your smartphone to your computer via USB. In some cases, rooting will require a reboot, so it is better to immediately make sure that the smartphone data is not encrypted (Settings -> Security -> Encryption), otherwise after the reboot we will lose access to it.

    When root is obtained, simply copy the files to hard drive With using ADB. We are only interested in the /data and /sdcard partitions, so we do this (instructions for Linux):

    $ adb root $ adb pull /data $ mkdir sdcard && cd sdcard $ adb pull /sdcard

    All files will be received in the current directory. Please note that if the smartphone does not have an SD card slot, then the contents virtual card the memory will be located in the /data section and the second command will simply not be needed.

    What to do next with these files, only your imagination will show. First of all, you should pay attention to the contents of /data/data, all the private settings of everyone are stored there installed applications(including system ones). The formats for storing this data can be completely different, but the general practice is to store it in traditional formats. Android databases SQLite3 data. They are usually located along approximately the following paths:

    /data/data/com.examble.bla-bla/setting.db

    You can find them all using the Linux find command, running in the original directory:

    $find. -name\*.db

    They can contain not only personal data, but also passwords (the built-in browser stores them exactly like this, and in clear form). You just need to download any graphical database manager SQLite3 and enter the password string in its search field.


    Application Research

    Now we can finally turn off airplane mode so that the smartphone can communicate with Google services and other sites. There should no longer be a SIM card in it, and location determination (including by IP) can be disabled in “Settings -> Location”. After this, it will no longer be possible to track us.

    What to do next? Go through correspondence in Gmail, find passwords. Particularly scrupulous people even create a special folder for letters with passwords and confidential information. You can also try to request a password change on services with confirmation via email, but in the case of Google, Facebook, PayPal and other normal services this will only work if you have a phone number, for which you will have to return the SIM card to its place.

    In general, everything is standard here. We have an email, perhaps a phone number, but no passwords for services. All this should be enough to hijack many accounts, but whether it is necessary or not is a more serious question. The same PayPal or WebMoney account is extremely difficult to restore even for the owner himself, and the information received here will clearly not be enough. The point of hijacking accounts from Odnoklassniki and other similar sites is very questionable.

    You can clear the /system partition of possible bookmarks by simply reinstalling the firmware. Moreover, it is better to use an unofficial one and flash it through the standard recovery console. In this case, the anti-thief will not be able to backup itself using the functions of the custom console.

    Conclusions

    In no way do I advocate doing what is described in this article. The information it contains, on the contrary, is intended for people who want to protect their data. And here they can draw several obvious conclusions for themselves.

    • First: to protect information on a smartphone, just three simple mechanisms already built into the smartphone are enough: a password on the lock screen, data encryption and disabled ADB. Activated together, they will completely cut off all access paths to the device.
    • Second: having anti-theft on your smartphone is very good idea, but you shouldn't rely on it 100%. The best it can provide is the ability to delete data if it gets caught by a less than smart thief.
    • And thirdly, the most obvious: immediately after losing your smartphone, you need to revoke your Google password, change passwords on all services and block your SIM card.

    Where the specimens in question were actually found.

    Background

    Two years ago, October 21, 2008 mobile Android platform ceased to be just a virtual basis for developers and entered the real world in the form of the T-Mobile G1 (HTC Dream) communicator. Since its first release, the system has undergone many changes, both in the quality of the code and in the number of features provided to it. However, as some Khabrovites rightly noted, the quality and popularity of the platform depend not only on the intensity of its development and the quality of its own code, but also on the applications that it allows you to use.

    Also, if you like to pay attention to small details, you might have noticed that Android is like operating system, quickly gained great popularity not only among ordinary users, but also from manufacturers of mobile devices - after all, they quickly began to produce business-class communicators.
    Be careful, there are a lot of screenshots!

    Nobody's perfect

    However, the main difference between Android devices and business-class communicators is the ability to actively use Internet services, not only those provided by the main developer - Google, but also many others. All this leads platform users to the need to store a lot of personal data - not just their PIN codes bank cards, but also many passwords. For a long time I myself stored passwords in “simple” notebook- AK Notepad, however, now I want to look at applications that allow you to do this more correctly - encrypting information that is not intended for outsiders.

    Review

    List of candidates selected for consideration:

    When launched for the first time, KeePasDroid prompts the user to create a new one or open existing base password storage:


    KeepPassDroid. Rice. 1. Creating/selecting a database for passwords.

    I was running this application for the first time, so the database needed to be created:


    KeepPassDroid. Rice. 2. Enter the master password.

    Optionally, KeePassDroid also offers to use a key file instead of a password. I rarely use files for authorization (the exception is SSH connections), so I entered the usual master password.

    Without further questions, the application showed me a list of two groups with a single button “Add group”, which I did not fail to do:


    KeepPassDroid. Rice. 3. List of groups with the “Social Networks” group I created.

    Unfortunately, at first I did not notice that the group icon is selected when creating it, and changing the icon of an already created group is not provided in KeePassDroid:

    KeePassDroid has one nice feature - creating nested groups. Therefore, sorting passwords and dividing them into groups and subgroups is limited only by the flight of your imagination :)

    So, inside the “Social Networks” group that arose, I decided to create a single element - to save the password for my account on Facebook. It turned out to be quite simple - inside the group you need to click the “Add entry” button, which is what I did:

    After adding an element, the group looks like this:

    Inside the element, you can see the information you entered earlier. The password is displayed in dots - in clear form you will not recognize it even when editing the element. Instead, KeePassDroid prompts you to copy the password to your clipboard by placing this prompt in the system notification area. But for some reason, twice According to user @pr0tey - in the first line the application prompts you to copy your login, in the second - your password (Fig. 9).

    KeepPassDroid. Rice. 10. Program menu. KeepPassDroid. Rice. 11. Settings.

    The program menu (Fig. 10), in my opinion, has sufficient and necessary functionality - search for existing elements, change the master password and program settings, which somehow reminded me of the settings TrueCrypt programs(Fig. 11). KeePassDroid allows you to store or not store the history of the key file, storage time in the clipboard, hide or not hide the password, and so on. Overall, my impressions of the application are positive.

    2. B-Folders


    Official website

    It looks like creating a database when running storage applications classified information- this is a kind of unspoken standard among Android platform developers

    The B-Folders application does not deviate from this standard, and upon first launch the user sees a standard offer:


    B-Folders. Rice. 1. Creating a database for passwords.

    When creating a database, the user has the opportunity to specify the location of its storage (in the internal memory of the phone or on the SD card), set a password, and also specify the time after which the database will be closed if not used. To open it, you will have to enter the password again.

    Unfortunately, at the time of creating the B-Folders database, I was “pleased” unpleasant screen, however, after a restart it continued to work:


    B-Folders. Rice. 2. The application closed unexpectedly.

    When first launched, the application developers notify their users about new program features using a pop-up window:


    B-Folders. Rice. 3. Notification of new features.

    The notification says that the program now has the ability to create a database on an SD card, as well as synchronize it using a USB cable, in addition to previously existing methods do it over the network. Personally, I don’t like such notifications and believe that the list of program features could simply be placed in the “help” section or something similar.

    Create new element in B-Folders is easy - you need to click on the “New Item” button, after which the program will give you the following choice:


    B-Folder. Rice. 4. List of created elements.

    As always, I create a folder (group, category) “social network” (Fig. 5), inside it there is an element “Login Password” (Fig. 6)

    Just like KeePassDroid, B-Folders allows you to create elements inside other elements, and most importantly, subfolders. This gives the user greater freedom in the distribution of their elements.

    While working with the program, a strange feature was discovered. B-Folders for some reason closes the password database when you click on the Back or Home buttons and thus you will have to enter the master password every time if you just want to switch between B-Folders and the browser. In my opinion, this is not very convenient.

    To finish the description, I will say the following. B-Folders has strong point- ability to synchronize with desktop computer, however, I don't really like programs that store my passwords and, at the same time, have uncontrolled access to the Internet.

    In general, the impression is positive, but I would also like to wish the authors to make the application more stable.

    3. Handy Safe Pro


    Official website

    When launched for the first time, the application honestly warns the user that a fully functional free version for a period of 14 days (Fig. 1.)

    Handy Safe Pro. Rice. 1. Trial Warning. Handy Safe Pro. Rice. 2. Creation of a new database.

    The next step - according to an already established tradition - is the creation of a database for storing secret information (Fig. 2.). After this procedure, Handy Safe Pro shows a screen with a preset set of beautiful folders, which, however, does not interest me - because I again create a “social networks” folder in order to place the “Facebook” element there :)

    When adding a new element to the “social network” folder, the application showed a very modest list of three elements - Card, Template and Folder, but then:


    Handy Safe Pro. Rice. 5. Sets of elements.

    Oh yes! The developers have provided me with a list of the most popular Internet services, including a large and beautiful icon My favorite Facebook stood out!

    Filling out information about an element is reminiscent of the previously discussed programs, but the information to fill out is not limited to a fixed number of fields - you are free to add as much contact information as you want. The only thing that seemed a little strange to me is that a regular text field is used to enter the password, which is still somewhat strange for such an application.

    However, when viewing information about an element, the entered information appears to the user as needed (Fig. 8) and is revealed only after clicking the “Show Password” button (Fig. 9):

    Browsing detailed information, you also have the opportunity to copy the password to the clipboard.

    Handy Safe Pro. Rice. 10. Program menu. Handy Safe Pro. Rice. 11. Settings.

    Handy Safe Pro, like B-Folders, has the ability to synchronize data with a desktop computer, however, your data will not be transferred over the Internet.

    4. Password Master


    Official website

    Password Master is perhaps the strangest of all the programs discussed in this review.

    Well, in a family with its share of black sheep, someone still had to stand out from the crowd. Traditional database creation is represented by entering a master password, which can only be a combination of numbers. Personally, I don't think this is very secure, however, some may like the simplified entry of information for a mobile device. Who knows... Another oddity of this application was the screen asking you to indicate your main mailbox. Main role mailbox- the ability to restore the master password if you suddenly forget it. Of course, this is again convenience at the expense of safety.

    When creating an element, Password Master, unfortunately, does not provide the ability to create your own categories, so I had to create the “Facebook” element as is, assigning it the “Internet” category, instead of the “social network” category that I already liked.

    The password is written in a regular text field, after which it seems that the developers of this software product They didn't care about safety at all.

    The appearance of the elements depends directly on the selected category:


    Password Master. Rice. 5. Added Facebook.

    The settings of this application are unremarkable, so I won’t dwell on them. The impressions from the program are very mixed, although perhaps it will appeal to those who like very simple software.

    5. OI Safe


    Official website

    Working with OI Safe is similar to working with previous applications– it all starts with entering the master password (Fig. 1) and a warning that you need to save the key (Fig. 2):

    After accepting the user agreement in OI Safe, as in KeePassDroid, the user sees a list of two preset categories - Business and Personal. Unfortunately, I made a mistake and decided to create a “Facebook” element inside the Personal category. Noticing the error, I canceled the creation, but OI Safe added an empty element to the category (Fig. 3.4):

    The second disadvantage of this action is the inability to assign icons to elements or categories.

    The program menu (Fig. 4.) seems very modest unless you select the “More” item (Fig. 7).

    The program settings are also similar to KeePassDroid, and just like KeePassDroid, OI Safe does not support synchronizing user data with a desktop computer.

    My strange conclusion

    I looked at a small cross-section, just one direction of programs presented in the Android Market, and in my humble opinion - a set existing applications quite capable of satisfying many users. But will you agree with me or not?

    Tags:

    • android
    • password storage
    • android market
    Add tags