We focused on the utilization of Kotlin in the development of applications for the Android platform in the previous four chapters. The chapter we just concluded covered, extensively, the various activities involved in securing and deploying an Android application. We took a look at some best practices—in relation to security—when working with data storage as well as when communicating over a network. In addition, we discussed the necessary security considerations when handling user inputs and working with user credentials.
Furthermore, we looked at various ways of securing some Android application components—such as services and broadcast receivers. Lastly, we took a step-by-step approach to properly deploying an Android application to the Google Play Store. In this chapter, we will have an in-depth look at how...