Emulating Windows system calls, take 2
Emulating Windows system calls, take 2
Posted Jul 19, 2020 19:29 UTC (Sun) by clump (subscriber, #27801)In reply to: Emulating Windows system calls, take 2 by nix
Parent article: Emulating Windows system calls, take 2
"disable your screen lock"
"have full network access"
"record audio"
"access location in the background"
"take pictures and videos"
"reroute outgoing calls"
I can't remove these permissions. I can't audit their use. I can't examine the source code. Not my idea of secure, private, or user-respecting.
If pointing out issues with Google Play Services is too easy, look at "all permissions" for other apps. There is also the matter of Android's exploit track record, and all of the well-documented issues with applications served from the official Google Play Store.
My point is that Android uses Linux but offers none of its benefits.
Posted Jul 20, 2020 12:35 UTC (Mon)
by nim-nim (subscriber, #34454)
[Link]
You can not understand Android or Chrome security choices if you do not acknowledge they are extensions of Google IT, and the user is outside the target security perimeter.
Posted Jul 23, 2020 10:22 UTC (Thu)
by domenpk (guest, #12382)
[Link] (3 responses)
What's the permission system on common Linux desktop like? Most "apps" are running under same UID, have access to all the data users actually care about, many peripherals etc.
Posted Jul 23, 2020 13:59 UTC (Thu)
by clump (subscriber, #27801)
[Link] (2 responses)
Android's additional security features are meaningless in practice.
Posted Jul 23, 2020 14:47 UTC (Thu)
by pizza (subscriber, #46)
[Link] (1 responses)
Incorrect.
Android completely isolates applications from each other. One application cannot see/access the data of another.
> However the security features of Android are useless if the user has no choice but to accept all or none of an application's permissions.
That sounds like a problem brought on by using proprietary software, not the underlying permission/security model.
Android's model requires those permissions to be explicitly stated and granted, which is a huge step forward from the free-range model of a traditional desktop environment (Linux or Windows or whatever) -- where applications have carte blanche to do pretty much whatever they want -- including audio, video, networking, and access to every file the user has.
Posted Jul 23, 2020 16:20 UTC (Thu)
by clump (subscriber, #27801)
[Link]
Unless the storage permission is required which makes the external storage a free-for-all. I trust you'd agree that there's plenty of valuable application and user data on the external storage.
Great points about a traditional desktop environment. An exploit or hostile application shouldn't allow the compromise of a user's entire home directory by default. We can and should do better.
Emulating Windows system calls, take 2
Emulating Windows system calls, take 2
Emulating Windows system calls, take 2
Emulating Windows system calls, take 2
Emulating Windows system calls, take 2