UPDATE: source code published on Github [2, 5]
Good news Everyone! I wrote an app that bypasses
TaintDroid's [1] privacy monitoring features (Taint analysis) in more than a few ways. I will share the app on my
GitHub [2] account very soon. Currently the app is capable of collecting private information such as Android device ID, Google account ID, network ID, IMEI etc. and send it to a pre-configured server (of course without raising any TaintDroid alert). If anyone is interested while I fine-tune my app (add support for reconfigurable server among other small things), please drop me a line in the comments. I would be happy to share how and what I have done.
To know more about how TaintDroid and Taint analysis works, please read their publications
here [2]. If you
Google for TaintDroid, you will also find a fair amount of information on what it is and how it works. Thanks for reading my Blog. I will update this post as soon as the next bit is ready.
[1]
http://appanalysis.org/
[2]
https://github.com/gsbabil
[3]
http://appanalysis.org/pubs.html
[4]
http://www.google.com.au/search?q=TaintDroid
[5]
http://gsbabil.github.io/AntiTaintDroid/