That said on the flipside you could also see what kind of permissions are allowed to the specific application. Most of the vulnerabilities today tend to occur in applications that users give more permissions to than they should. As evidenced by applications such as wallpapers sending out phone information, or applications drawing gps addresses etc.
On Aug 27, 2:54 pm, Chris Palmer <[email protected]> wrote: > On Fri, Aug 27, 2010 at 11:05 AM, Eric Dorman <[email protected]> wrote: > > So If I understand you correctly the VM isn't the > > most secure barrier and it could be vulnerable? > > The VM is not a security barrier, hence by definition is not > vulnerable. An attacker who "broke" the VM would gain nothing. > > To break Android is to break the separation of Linux UIDs, such as by > breaking the kernel, finding a place where a permissions check is not > performed, and so on. -- You received this message because you are subscribed to the Google Groups "Android Security Discussions" group. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/android-security-discuss?hl=en.
