take SD card from phone and place it in SD card reader into PC (for convenient browsing). You would see .android_secure directory (hidden under Linux cause dot comes first). There are files with .asec extension inside. each file represent storage space for particular app. For example OperaMini browser contained inside com.opera.mini.android-1.asec File is encoded so can be placed on raw FAT storage w/o compromizing app security. So it should be possible.
But looks like I should correct myself. Looking into this repository I don't see NativeBOINC package there ! It's in \Android\data\sk.boinc.nativeboinc\files\boinc\ instead. And there are scientific app binaries too. For example: \Android\data\sk.boinc.nativeboinc\files\boinc\projects\volunteer.cs.und.edu_subset_sum\SubsetSum_0.11_arm-android-linux-gnu - binary for SubsetSum@home project. So, NativeBOINC uses unsecured (naturaly, what to prevent from copying in GPLed project ?!) storage. It should be even more easy to implement for "official" BOINC then. Also, that directory contains this file: .__execs__ With next content: SubsetSum_0.11_arm-android-linux-gnu Perhaps, such file is required for Android to understand that that particular file is executable (indeed, FAT has no "executable" flag). So, NativeBOINC completely follows usual BOINC directory structure and those .__execs__ files are the single difference I would find comparing with my BOINC installation on Windows for example. I think "official" BOINC under Android could just follow absolutely same model and doesn't use secured storage cause we should not prevent not boinc nor project binaries from copying (moreover, it's illegal for GPLed executables AFAIK). Hence, execution from SD is possible. Среда, 13 марта 2013, 9:47 +01:00 от Bernd Machenschalk <[email protected]>: >Hi! > >On 13.03.13 04:14, Raistmer the Sorcerer wrote: >> Not too needed actually cause execution from secured external storage is >> possible (and all data can reside there too). > >When it comes to Android I am a rather average dumb user, so may forgive my >ignorance if I am mistaken. But: > >To my knowledge my Android phone holds a simple SD card which is FAT-formatted >(I can take it out and read it in a dumb USB card reader) and doesn't >contain any visible "secured" storage (area) accessible to me. > >To have that I think the SD card would need to be specifically formatted, a >procedure that I wouldn't require an ordinary participant of the targeted >group of people to do to run BOINC. > >Best, >Bernd > _______________________________________________ boinc_dev mailing list [email protected] http://lists.ssl.berkeley.edu/mailman/listinfo/boinc_dev To unsubscribe, visit the above URL and (near bottom of page) enter your email address.
