Talk:Fire Card Gallery (iOS)/@comment-5889516-20130111184056/@comment-2246198-20130115123342

On the iOS side, our apps are just renamed zipfiles, so it's possible to protect them (my AV scanner barks about them alot, it doesn't like password protected zips), but the actual app folder inside the phone isn't protected at all.

If android runs the app (and saves its data) from within the android version of the app package, then it's likely that the database is inaccessible - but that's a very processor-intensive way to run an app and would be incredibly inefficent, so it's unlikely that they've done it that way. I'd lay money on there being a process database being stored _somewhere_ on the phone, it's just a matter of finding it.

The android I did play with had a  \data\ folder in the root (and some research on android app creation tells me that is where most apps store their data), but my research also told me that the Android OS locks that folder out by default - you have to run a command to gain access to the folder, AFTER you've rooted the phone itself. See here: clicky

If I had access to a rooted android, I'd start by doing a full dump of the phone to my PC, and then start ripping it apart from there. I don't know how big a full dump is, but if it's not too incredibly massive, you could rar it up and stick it on mediafire and I could take a look through that.