Ok lets say that I have an app on my phone that uses a database (SQLLite/ RealmDb etc.) to store data that the app uses, and then some bad entity (hacker) gets hold of my none-rooted-phone and somehow gains access to it.
If the entity can decompile the code and create his own app (or just the parts that need the data) to use the database, could he then move the database from my device onto another device (or to another app on my device, it doesn't really matter) and then access/use the data in the database (wether the data is crypted or not)?
Example would be to just get encrypted data and send it straight to a rest api and get back valid response.
Is there a "tampering connection" to a mobile database so it can't be used in another device/app sandbox? Its probably different between databases and OS's.
Desclaimer: All my apps and api's use jwt tokens and server side validation and on top of that https pinning to the servers cert so I'm not asking for best practice security. Look at the question more like a need to sell management on security by me trying to answer "Can it be done?"