take SD card from phone and place it in SD card reader into PC (for convenient 
browsing).
You would see .android_secure directory (hidden under Linux cause dot comes 
first). 
There are files with .asec extension inside. each file represent storage space 
for particular app.
For example OperaMini  browser  contained inside com.opera.mini.android-1.asec
File is encoded so can be placed on raw FAT storage w/o compromizing app 
security.
So it should be possible.

But looks like I should correct myself. Looking into this repository I don't 
see NativeBOINC package there !
It's in \Android\data\sk.boinc.nativeboinc\files\boinc\ instead. 
And there are scientific app binaries too. For example:
\Android\data\sk.boinc.nativeboinc\files\boinc\projects\volunteer.cs.und.edu_subset_sum\SubsetSum_0.11_arm-android-linux-gnu
 - binary for SubsetSum@home project.
So, NativeBOINC uses unsecured (naturaly, what to prevent from copying in GPLed 
project ?!) storage. It should be even more easy to implement for "official" 
BOINC then.
Also, that directory contains this file:
.__execs__
With next content:
SubsetSum_0.11_arm-android-linux-gnu
Perhaps, such file is required for Android to understand that that particular 
file is executable (indeed, FAT has no "executable" flag).
So, NativeBOINC completely follows usual BOINC directory structure and those 
.__execs__ files are the single difference I would find comparing with my BOINC 
installation on Windows for example.

I think "official" BOINC under Android could just follow absolutely same model 
and doesn't use secured storage cause we should not prevent not boinc nor 
project binaries from copying (moreover, it's illegal for GPLed executables 
AFAIK).

Hence, execution from SD is possible.


Среда, 13 марта 2013, 9:47 +01:00 от Bernd Machenschalk 
<[email protected]>:
>Hi!
>
>On 13.03.13 04:14, Raistmer the Sorcerer wrote:
>> Not too needed actually cause execution from secured external storage is 
>> possible (and all data can reside there too).
>
>When it comes to Android I am a rather average dumb user, so may forgive my 
>ignorance if I am mistaken. But:
>
>To my knowledge my Android phone holds a simple SD card which is FAT-formatted 
>(I can take it out and read it in a dumb USB card reader) and doesn't 
>contain any visible "secured"  storage (area) accessible to me.
>
>To have that I think the SD card would need to be specifically formatted, a 
>procedure that I wouldn't require an ordinary participant of the targeted 
>group of people to do to run BOINC.
>
>Best,
>Bernd
>

_______________________________________________
boinc_dev mailing list
[email protected]
http://lists.ssl.berkeley.edu/mailman/listinfo/boinc_dev
To unsubscribe, visit the above URL and
(near bottom of page) enter your email address.

Reply via email to