When talking about the benefits of the Android platform, most users usually cite customizability, device diversity, and flexible pricing. And for some reason there is no question of safety. Apparently, most simply don't think Android is safe. The biggest reason may be that the Google Play Store is an open marketplace: it is much easier to upload malware there than in the Apple AppStore. And it did happen. Repeatedly .
This is a real problem. But it is connected with the insufficiently strict policy of Google on the platform. Although it seems to be gradually changing . In any case, you should always remember which software should be trusted and which should not. On any platform.
Recently I was looking for a new phone and at the same time decided to find out what the level of security of the Android platform is now and which phone is the most secure. It turns out that Android has a pretty good security model.
First of all, the device manufacturer must ensure that its Android OS phone complies with the Android Compatibility Definition Document ( CDD ). If the device does not meet the hardware requirements, it will not be able to work with this OS. If a vendor changes the Android system and thereby violates the CDD, then that system can no longer be called βAndroidβ. Therefore, if you buy a device and it is explicitly stated that it is running Android, it means that CDD compatibility is guaranteed.
CDD guarantees security
CDD for Android 10 has a whole section dedicated to security. This document is huge and links to many other huge documents. I will try to formulate it as briefly as possible.
The permission system must match the Android Security Reference . It covers issues such as the ability to revoke permissions after they have been granted, how permission requests work, what permissions can only be granted to system applications, and more.
The sandbox must be organized correctly. Details are described in this document... Basically, every application has a unique UNIX user ID and directories that are owned by that and only that user. Since Android does not have a root user, other applications cannot access the data that is stored in these directories. Hence, introducing root into the system would violate the security model. This is why we will never see an Android phone that is rooted by default. Apart from all this, there are also SELinux policies to enforce access control.
Thus, SELinux Mandatory Access Controls (MACs) should provide an isolated environment for kernel applications. Mandatory access control policies allow you to set and enforce restrictions. They cannot be changed or overwritten by any user and therefore, it is practically beyond the power of malware.
Encryption
CDD also requires the / data and / sdcard partitions of the on -board storage to be encrypted out of the box. The / data section contains personal data for each application. The / sdcard section is a general purpose storage: there, for example, your photos and documents are stored.
Therefore, if the device is turned off, and it falls into the hands of someone in this state, it will be almost impossible to retrieve data from the built-in storage.
Verified download
First of all, this kind of loading should also work correctly :
- ( ), . , .
- , Android, . , Android.
Many people think that such a boot only secures the device when an attacker has physical access to the machine, and thus downplay the importance of this feature. But when it comes to mobile devices, first of all, it is precisely physical access that should be considered.
Moreover, verified loading ensures that unwanted code is not executed during or immediately after loading. This makes life difficult for any type of malware. After rebooting, we automatically remove this software if it suddenly gets into the system. For example, jailbreak exploits like checkra1n do not persist across reboots. Let me remind you that iOS also uses verified download.
Data Access Control
For encryption, keys are needed, which must be stored somewhere. Android can use Keymaster and Strongbox technologies to protect keys, even in the event of a kernel compromise or hardware exploits (such as Meltdown and Specter ).
Samsung KNOX, for example, goes even further: after flashing the bootloader, kernel or Recovery to a custom one, as well as when root rights are obtained on the device, the electronic fuse will be activated. After activating it, the user will no longer be able to pay for purchases through the Samsung Pay mobile payment service, and the device will lose access to data from protected catalogs.
Stop paying for memory errors
A recent study of Microsoft has shown that about 70% of all vulnerabilities in Microsoft products are associated with vulnerability in the memory. Google research showed the same for Chrome. So there is certainly reason to believe that this is true for Android too.
And Google specialists decided to fix this problem. In Android 11, they used a new memory allocator, several safer kernel and user-space initialization methods, and real-time memory error detection methods.
Memory errors will certainly not go away completely, but there will probably be much less of them now.
The tip of the iceberg ...
All of the above is just the tip of the iceberg. There are many more interesting details to learn about the security of Android systems. For example, you can write a separate long article about the same Samsung KNOX.
So, contrary to popular belief, modern Android devices are pretty safe.
Advertising
Secure virtual servers with DDoS protection and powerful hardware. All this is about our epic servers . The maximum configuration is 128 CPU cores, 512 GB RAM, 4000 GB NVMe.