- Exploring SE for Android
- William Confer William Roberts
- 159字
- 2021-07-23 20:37:34
Android's use of DAC
In the Android sandbox model, every application runs as its own UID
. This means that each app can separate its stored data from one another. The user and group are set to the UID
and GID
of that application, so no app can access the private files of an application without the application explicitly performing chmod
on its objects. Also, applications in Android cannot have capabilities, so we don't have to worry about capabilities such as CAP_SYS_PTRACE
, which is the ability to debug another application. In Android, in a perfect world, only system components run with privileges, and applications don't accidentally chmod
private files for all to read. This issue was not corrected by the current AOSP SELinux policy due to app compatibility, but could be closed with SELinux. The proper way to share data between applications on Android is via binder, and sharing file descriptors. For smaller amounts of data, the provider model suffices.
- Vue.js設計與實現
- 數據庫程序員面試筆試真題與解析
- iOS開發實戰:從零基礎到App Store上架
- Java從入門到精通(第4版)
- Windows Server 2016 Automation with PowerShell Cookbook(Second Edition)
- Apache Kafka Quick Start Guide
- PHP 7+MySQL 8動態網站開發從入門到精通(視頻教學版)
- Service Mesh實戰:基于Linkerd和Kubernetes的微服務實踐
- JavaScript悟道
- Keil Cx51 V7.0單片機高級語言編程與μVision2應用實踐
- Python數據科學實踐指南
- 零基礎PHP從入門到精通
- Perl 6 Deep Dive
- ArcGIS Blueprints
- ACE技術內幕:深入解析ACE架構設計與實現原理