When we last left Agent Will Verduzco, he was fleeing from his pursuers with his stolen, prototype Samsung Galaxy SIII. Having delivered his precious cargo to the extraction point, Agent Verduzco is now on a new assignment: infiltrating the notorious Google I/O conference.
At the entrance of Moscone West, he sees a cluster of Java programmers huddling around their computers. He slips by one of them and swipes the man’s identification badge. Calmly proceeding inside, he passes through the body scanners and metal detectors as the infamous Google Security Agents eye him suspiciously. He heads towards the secret backroom, keeping an eye out for any undercover Google patrols. Upon reaching the secure door, he takes out his HTC One X, and plugs the micro USB cable into the hidden maintenance slot on the control box. He downloads the files from the box and begins running the crypTo decryption application to decipher the files, using the password given to him by the lethal scientist Adam Outler.
The seconds tick as he waits for the application to finish. Sweat begins pouring from his brow as minutes feel like days. Finally the screen flashes—success! He enters the password into the box on the door and the mechanized portal swishes open, revealing his prize: the elusive Nexus 7 tablet. Will grabs the device and turns to leave, when he hears a female voice yell, “Stop right there.” Agent Verduzco spins around ready to turn on his masculine charm when-
You didn’t want to hear about the rest of Agent Verduzco’s adventures did you? I figured you’d much rather hear about the amazing Android application he used—crypTo by XDA Member masterjb. This app has:
-Binary, Base64, and MD5 Lookup
Passworded File Encryption
-AES 256 bit
-Hashing Files (integrity of files)
-Compare Hashes and Strings
With all these cool features, and more being added as we speak, what are you waiting for? Head on over to the original thread and give it a go._________
Want something on the XDA Portal? Send us a tip! -- Join us for xda:devcon 2014!