Slide 20
Slide 20 text
@Sp4ghettiCode / spght.dev
Improper Platform Usage
Example #2
• ‘Tap-jacking’ vulnerability
• Apps can draw over other apps and monitor their contents
• They can also pass spoofed touch events
• Combined, this can be used maliciously to trick users
into entering passwords, accepting permissions, etc
• Permission required for these apps, but only recently