I am working on the security of mobile applications and in android I came across the tainting object concept. But I have not figured out how exactly tainting works in Java or Android. 

Similar questions and discussions