Temporarily add a line that logs encryption key in SQLiteQueryExecutor::initialize(). Ensure in Android log cat that encryption key changes with every application re-install.
Independently execute the following steps:
1. Change `allowBackup` to true. Install the app.
2. In Android studio check `Device File Explorer` for the file: `data/data/app.comm.android/shared_prefs/SecureStore.xml`. Save the content under "comm.encryptionKey" identifier. Kill the app
3. Execute the following instructions: https://developer.android.com/guide/topics/data/testingbackup apart from "Test restore" section.
4. Uninstall the app. Install it again.
5. Repeat step 2. Ensure contents are exactly the same.
6. Uninstall the app. Revert `allowBackup` to false. Install the app.
7. Repeat step 2. Ensure contents differ.
8. Try to complete step 3. Ensure that command `adb shell bmgr backupnow app.comm.android` now fails.
Steps and outputs above prove that `allowBackup=true` enables us to restore secrets after applications is uninstalled which is undesirable. It also proves that `allowBackup=false` disables this possibility. Therefore setting `allowBackup=false` is a necessary step that is a subject of this differential.