On 11.4.2014 11:39, José Bollo wrote:
Of course I make the particular binary u+s root.

That is a kind of nuclear fire that you are putting on our temple.

Question: how will a tizen user be allowed to do that?

Generally I prefer finer grained control based for example on CAPS instead of setuid(0).

We are talking about OS components here aren't we? Not about regular user apps.

What I want to do is to try to protect system components from possible exploits in other system components. So that exploiting one system component doesn't open up the entire device.

Since we deviated to talk about display managers...

I've spent countless hours discussing about secure pin entry GUIs and such in the past. There are many ways doing it with various levels of security. From simple things (like implemented in pinentry-gtk/pinentry-qt) all the way to display hardware take-over using secure co-processor.

One part of the story is how to prevent malicious third party application from mimicing entire GUI of the device by utilizing full-screen mode. Or faking system pop-up dialogs. Things like access controlled access to some screen areas like notification area, or use of access controlled LED indicator or such.

It becomes even more tricky when there are in-app purchases, especially for games operating in full-screen mode. Protecting your app-store account in such cases is important while at the same time making such things possible.

_______________________________________________
Dev mailing list
[email protected]
https://lists.tizen.org/listinfo/dev

Reply via email to