Skip to content

Commit 4caa0d7

Browse files
author
Adrian Ludwig
committed
Update existing security FAQ and Developer Overview
Change-Id: I9102a92908a8ebe314f83638569d0257dcfe3d45
1 parent faa75f6 commit 4caa0d7

2 files changed

Lines changed: 55 additions & 54 deletions

File tree

docs/html/guide/topics/security/security.jd

Lines changed: 15 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,10 @@ page.title=Security and Permissions
2020
</ol>
2121
</div>
2222
</div>
23+
<p>This document describes how application developers can use the
24+
security features provided by Android. A more general <a
25+
href="http://source.android.com/tech/security/index.html"> Android Security
26+
Overview</a> is provided in the Android Open Source Project.</p>
2327

2428
<p>Android is a privilege-separated operating system, in which each
2529
application runs with a distinct system identity (Linux user ID and group
@@ -41,7 +45,7 @@ includes reading or writing the user's private data (such as contacts or
4145
e-mails), reading or writing another application's files, performing
4246
network access, keeping the device awake, etc.</p>
4347

44-
<p>Because the kernel sandboxes applications from each other, applications
48+
<p>Because Android sandboxes applications from each other, applications
4549
must explicitly share resources and data. They do this by declaring the
4650
<em>permissions</em> they need for additional capabilities not provided by
4751
the basic sandbox. Applications statically declare the permissions they
@@ -50,11 +54,11 @@ application is installed. Android has no mechanism for granting permissions
5054
dynamically (at run-time) because it complicates the user experience to the
5155
detriment of security.</p>
5256

53-
<p>The kernel is solely responsible for sandboxing applications from each
54-
other. In particular the Dalvik VM is not a security boundary, and any app
55-
can run native code (see <a href="/sdk/ndk/index.html">the Android NDK</a>).
56-
All types of applications &mdash; Java, native, and hybrid &mdash; are
57-
sandboxed in the same way and have the same degree of security from each
57+
<p>The application sandbox does not depend on the technology used to build
58+
an application. In particular the Dalvik VM is not a security boundary, and
59+
any app can run native code (see <a href="/sdk/ndk/index.html">the Android
60+
NDK</a>). All types of applications &mdash; Java, native, and hybrid &mdash;
61+
are sandboxed in the same way and have the same degree of security from each
5862
other.</p>
5963

6064
<a name="signing"></a>
@@ -220,12 +224,13 @@ permission:</p>
220224
</pre>
221225

222226
<p>You can look at the permissions currently defined in the system with the
223-
shell command <code>adb shell pm list permissions</code>. In particular,
224-
the '-s' option displays the permissions in a form roughly similar to how the
225-
user will see them:</p>
227+
Settings app and the shell command <code>adb shell pm list permissions</code>.
228+
To use the Settings app, go to Settings &gt; Applications. Pick an app and
229+
scroll down to see the permissions that the app uses. For developers, the adb '-s'
230+
option displays the permissions in a form similar to how the user will see them:</p>
226231

227232
<pre>
228-
$ adb shell pm list permissions -s
233+
$ adb shell pm list permissions -s
229234
All Permissions:
230235

231236
Network communication: view Wi-Fi state, create Bluetooth connections, full

docs/html/resources/faq/security.jd

Lines changed: 40 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,7 @@ parent.link=index.html
77
<li><a href="#secure">Is Android Secure?</a></li>
88
<li><a href="#issue">I think I found a security flaw. How do I report
99
it?</a></li>
10-
<li><a href="#informed">How can I stay informed of Android security
11-
announcements?</a></li>
10+
<li><a href="#informed">How can I stay informed about Android security?</a></li>
1211
<li><a href="#use">How do I securely use my Android phone?</a></li>
1312
<li><a href="#malware">I think I found malicious software being distributed
1413
for Android. How can I help?</a></li>
@@ -26,9 +25,15 @@ Android Open Source Project. We are dedicated to building and maintaining one
2625
of the most secure mobile platforms available while still fulfilling our goal
2726
of opening the mobile device space to innovation and competition.</p>
2827

29-
<p>The Android Platform provides a rich <a
28+
<p> A comprehensive overview of the <a
29+
href="http://source.android.com/tech/security/index.html">Android
30+
security model and Android security processes</a> is provided in the Android
31+
Open Source Project Website.</p>
32+
33+
<p>Application developers play an important part in the security of Android.
34+
The Android Platform provides developers with a rich <a
3035
href="http://code.google.com/android/devel/security.html">security model</a>
31-
that allows developers to request the capabilities, or access, needed by their
36+
that to request the capabilities, or access, needed by their
3237
application and to define new capabilities that other applications can request.
3338
The Android user can choose to grant or deny an application's request for
3439
certain capabilities on the handset.</p>
@@ -49,63 +54,57 @@ can protect your message using our <a
4954
href="http://code.google.com/android/security_at_android_dot_com.txt">PGP
5055
key</a>.</p>
5156

52-
<p>We appreciate researchers practicing responsible disclosure by emailing us
53-
with a detailed summary of the issue and keeping the issue confidential while
57+
<p>We appreciate researchers practicing responsible disclosure by emailing us
58+
with a detailed summary of the issue and keeping the issue confidential while
5459
users are at risk. In return, we will make sure to keep the researcher informed
5560
of our progress in issuing a fix and will properly credit the reporter(s) when
56-
we announce the patch. We will always move swiftly to mitigate or fix an
57-
externally-reported flaw and will publicly announce the fix once patches are
58-
available to users.</p>
59-
61+
we provide the patch. We will always move swiftly to mitigate or fix an
62+
externally-reported flaw and provide updates to users. </p>
6063

61-
<a name="informed" id="informed"></a><h2>How can I stay informed of Android
62-
security announcements?</h2>
6364

64-
<p>An important part of sustainably securing a platform, such as, Android is
65-
keeping the user and security community informed of bugs and fixes. We will
66-
publicly announce security bugs when the fixes are available via postings to
67-
the <a
68-
href="http://groups.google.com/group/android-security-announce">android-security-announce</a>
69-
group on Google Groups. You can subscribe to this group as you would a mailing
70-
list and view the archives here.</p>
65+
<a name="informed" id="informed"></a><h2>How can I stay informed about Android security?</h2>
7166

72-
<p>For more general discussion of Android platform security, or how to use
67+
<p>For general discussion of Android platform security, or how to use
7368
security features in your Android application, please subscribe to <a
7469
href="http://groups.google.com/group/android-security-discuss">android-security-discuss</a>.
7570
</p>
7671

7772

7873
<a name="use" id="use"></a><h2>How do I securely use my Android phone?</h2>
7974

80-
<p>As an open platform, Android allows users to load software from any
81-
developer onto a device. As with a home PC, the user must be
75+
<p>Android was designed so that you can safely use your phone without making
76+
any changes to the device or installing any special software. Android applications
77+
run in an Application Sandbox that limits access to sensitive information or data
78+
with the users permission.</p>
79+
80+
<p>To fully benefit from the security protections in Android, it is important that
81+
users only download and install software from known sources.</p>
82+
83+
<p>As an open platform, Android allows users to visit any website and load
84+
software from any developer onto a device. As with a home PC, the user must be
8285
aware of who is providing the software they are downloading and must decide
8386
whether they want to grant the application the capabilities it requests.
8487
This decision can be informed by the user's judgment of the software
8588
developer's trustworthiness, and where the software came from.</p>
8689

87-
<p>Despite the security protections in Android, it is important
88-
for users to only download and install software from developers they trust.
89-
More details on how Android users can make smart security decisions will be
90-
released when consumer devices become available.</p>
91-
9290

9391
<a name="malware" id="malware"></a><h2>I think I found malicious software being
9492
distributed for Android. How can I help?</h2>
9593

96-
<p>Like any other open platform, it will be possible for unethical developers
94+
<p>Like any other platform, it will be possible for unethical developers
9795
to create malicious software, known as <a
9896
href="http://en.wikipedia.org/wiki/Malware">malware</a>, for Android. If you
99-
think somebody is trying to spread malware, please let us know at <a
97+
think somebody is trying to spread malware, please let us know at <a
10098
href="mailto:security@android.com">security@android.com</a>. Please include as
10199
much detail about the application as possible, with the location it is
102100
being distributed from and why you suspect it of being malicious software.</p>
103101

104-
<p>The term <i>malicious software</i> is subjective, and we cannot make an
102+
<p>The term <i>malicious software</i> is subjective, and we cannot make an
105103
exhaustive definition. Some examples of what the Android Security Team believes
106104
to be malicious software is any application that:
107105
<ul>
108-
<li>drains the device's battery very quickly;</li>
106+
<li>uses a bug or security vulnerability to gain permissions that have not
107+
been granted by the user</li>
109108
<li>shows the user unsolicited messages (especially messages urging the
110109
user to buy something);</li>
111110
<li>resists (or attempts to resist) the user's effort to uninstall it;</li>
@@ -122,35 +121,32 @@ to be malicious software is any application that:
122121
</p>
123122

124123

125-
<a name="fixes" id="fixes"></a><h2>How will Android-powered devices receive security
124+
<a name="fixes" id="fixes"></a><h2>How do Android-powered devices receive security
126125
fixes?</h2>
127126

128127
<p>The manufacturer of each device is responsible for distributing software
129128
upgrades for it, including security fixes. Many devices will update themselves
130129
automatically with software downloaded "over the air", while some devices
131130
require the user to upgrade them manually.</p>
132131

133-
<p>When Android-powered devices are publicly available, this FAQ will provide links how
134-
Open Handset Alliance members release updates.</p>
132+
<p>Google provides software updates for a number of Android devices, including
133+
the <a href="http://www.google.com/nexus">Nexus</a>
134+
series of devices, using an "over the air" (OTA) update. These updates may include
135+
security fixes as well as new features.</p>
135136

136137
<a name="directfix" id="directfix"></a><h2>Can I get a fix directly from the
137138
Android Platform Project?</h2>
138139

139-
<p>Android is a mobile platform that will be released as open source and
140-
available for free use by anybody. This means that there will be many
141-
Android-based products available to consumers, and most of them will be created
140+
<p>Android is a mobile platform that is released as open source and
141+
available for free use by anybody. This means that there are many
142+
Android-based products available to consumers, and most of them are created
142143
without the knowledge or participation of the Android Open Source Project. Like
143144
the maintainers of other open source projects, we cannot build and release
144145
patches for the entire ecosystem of products using Android. Instead, we will
145146
work diligently to find and fix flaws as quickly as possible and to distribute
146-
those fixes to the manufacturers of the products.</p>
147-
148-
<p>In addition, We will add security fixes to the open source distribution of
149-
Android and publicly announce the changes on <a
150-
href="http://groups.google.com/group/android-security-announce">android-security-announce</a>.
151-
</p>
147+
those fixes to the manufacturers of the products through the open source project.</p>
152148

153-
<p>If you are making an Android-powered device and would like to know how you can
149+
<p>If you are making an Android-powered device and would like to know how you can
154150
properly support your customers by keeping abreast of software updates, please
155151
contact us at <a
156152
href="mailto:info@openhandsetalliance.com">info@openhandsetalliance.com</a>.</p>

0 commit comments

Comments
 (0)