Hello all,
recently I received an alert in Google Play Console panel for one of my B4A apps about the exposing of a GCM key . This app uses GCM/Firebase Lib and it's code is written according the recommendations given by @Erel in that library tutorial. (this: https://www.b4x.com/android/forum/t...s-firebase-cloud-messaging-fcm.67716/#content)
I really wasn't secure about that piece of code when we write the Key = xxxx to use Firebase GCM library...
Then, is there any programming best practice to avoid this exposing risk? What is the recommendation? I was thinking to put the key in a server database and then recover it using a POST and store in an internal and encrypted sqlite database but ... is this the best shortcut to assure the security in this question or is there any easier and maybe better option?
recently I received an alert in Google Play Console panel for one of my B4A apps about the exposing of a GCM key . This app uses GCM/Firebase Lib and it's code is written according the recommendations given by @Erel in that library tutorial. (this: https://www.b4x.com/android/forum/t...s-firebase-cloud-messaging-fcm.67716/#content)
I really wasn't secure about that piece of code when we write the Key = xxxx to use Firebase GCM library...
Then, is there any programming best practice to avoid this exposing risk? What is the recommendation? I was thinking to put the key in a server database and then recover it using a POST and store in an internal and encrypted sqlite database but ... is this the best shortcut to assure the security in this question or is there any easier and maybe better option?