OPPO Amber Lab
Author

OPPO Amber Lab

Centered on user data security and privacy, we conduct research and open our tech capabilities to developers, building an information‑security fortress for partners and users and safeguarding OPPO device security.

63
Articles
0
Likes
51
Views
0
Comments
Recent Articles

Latest from OPPO Amber Lab

63 recent articles
OPPO Amber Lab
OPPO Amber Lab
Aug 3, 2021 · Information Security

Uncovering BLE: History, Security Risks, and How to Protect Your IoT Devices

This article traces the evolution of Bluetooth Low Energy (BLE), explains why it dominates modern IoT, and examines three major security threat vectors—protocol flaws, supply‑chain vulnerabilities, and product design weaknesses—while offering concrete mitigation strategies and reference resources.

BLEBluetooth Low EnergyIoT security
0 likes · 13 min read
Uncovering BLE: History, Security Risks, and How to Protect Your IoT Devices
OPPO Amber Lab
OPPO Amber Lab
Jun 17, 2021 · Information Security

How to Permanently Erase All Data from Your Android Phone: A Step‑by‑Step Guide

Simply deleting files or resetting a phone does not truly remove data; this guide explains why old devices can leak personal photos, messages, payment info, and social accounts, and provides a detailed, multi‑step process to securely wipe and destroy all residual data on Android phones.

data wipingmobile data protectionsecure deletion
0 likes · 4 min read
How to Permanently Erase All Data from Your Android Phone: A Step‑by‑Step Guide
OPPO Amber Lab
OPPO Amber Lab
Apr 30, 2021 · Information Security

How Intent Redirection Bypasses Android Exported Component Restrictions

This article explains the difference between exported and non‑exported Android components, demonstrates how malicious apps can embed an Intent inside another exported component to reach private components, and provides practical detection and mitigation techniques to protect against Intent redirection vulnerabilities.

AndroidContent ProviderExported Component
0 likes · 12 min read
How Intent Redirection Bypasses Android Exported Component Restrictions
OPPO Amber Lab
OPPO Amber Lab
Mar 19, 2021 · Information Security

Essential Mobile Security Tips to Safeguard Your Personal Data

This guide outlines practical mobile security measures—including strong passwords, trusted apps, cautious network use, permission management, and timely updates—to protect personal information stored on smartphones from privacy breaches and attacks.

Security Updatespassword protectiontrusted apps
0 likes · 6 min read
Essential Mobile Security Tips to Safeguard Your Personal Data
OPPO Amber Lab
OPPO Amber Lab
Feb 19, 2021 · Information Security

How DICE Secures IoT Devices: From Unique IDs to Fast Boot

The article explains the DICE (Device Identity Composition Engine) standard introduced by the Trusted Computing Group, detailing its terminology, chain‑derived CDI mechanism, key generation, certificate issuance, and how it enables device identification, secure boot, rapid startup, data protection, and OTA firmware updates for IoT and mobile devices.

DICEDevice identityIoT security
0 likes · 11 min read
How DICE Secures IoT Devices: From Unique IDs to Fast Boot
OPPO Amber Lab
OPPO Amber Lab
Jan 8, 2021 · Information Security

How Third-Party SDKs Threaten Mobile Apps and How to Secure Them

This article reviews OPPO's sixth Technical Open Day session on application and data security, detailing the current state, case studies, detection methods, and SDL integration for third‑party SDKs, and offers practical recommendations to mitigate privacy leaks, code execution, and other high‑risk vulnerabilities.

SDLprivacy compliancethird-party SDK
0 likes · 11 min read
How Third-Party SDKs Threaten Mobile Apps and How to Secure Them
OPPO Amber Lab
OPPO Amber Lab
Dec 26, 2020 · Mobile Development

How Incremental Installation and Android V4 Signature Speed Up App Deployment

Incremental installation streams core APK files to launch apps quickly, while Android 11’s V4 signature uses Merkle trees for secure, efficient verification, enabling partial package delivery and background updates, a technique detailed with architecture, ADB workflow, and code structures for developers.

incremental-installationmerkle treemobile-development
0 likes · 9 min read
How Incremental Installation and Android V4 Signature Speed Up App Deployment
OPPO Amber Lab
OPPO Amber Lab
Oct 26, 2020 · Information Security

Understanding Core Cryptography Concepts: Public Keys, Digital Signatures, and AEAD

This article introduces essential cryptography fundamentals for programmers, covering public‑key encryption, key‑exchange protocols, digital envelopes, signatures, certificates, hash functions, MACs, and authenticated encryption with associated data, while highlighting practical security considerations.

AEADHash Functiondigital signature
0 likes · 5 min read
Understanding Core Cryptography Concepts: Public Keys, Digital Signatures, and AEAD
OPPO Amber Lab
OPPO Amber Lab
Sep 22, 2020 · Information Security

Understanding Cryptography: From Basics to Symmetric & Asymmetric Ciphers

This article introduces the fundamentals of cryptography, explaining what passwords are, the difference between encryption and decryption, classifications of cryptographic algorithms such as symmetric, asymmetric, hash functions, and message authentication, and illustrates concepts with examples like RC4 and block cipher modes.

EncryptionHash FunctionInformation Security
0 likes · 5 min read
Understanding Cryptography: From Basics to Symmetric & Asymmetric Ciphers