Master Key vulnerabilities in Android: countermeasures and attempts to exploit
Part two. The first part is available here. Risks associated with the vulnerabilities Bluebox reported that the vulnerabilities could be used to attain root rights in the system providing