Google’s advanced protection for weak users comes to Android

Photo of author

By [email protected]


With a height Of mercenary spyware and other targeted threats, technology giants such as Apple, Google and Microsoft have spent the past few years in an attempt to learn how to protect the digital life of its most at risk users all over the world. On mobile phone, and IOS lock mode launch from Apple In 2022 it was one of the concerted effort to perform non -implicit jobs in favor of the maximum security –differentiation Most users will not want to make it, but this may be worth it for the public personality, activist, journalist or dissident in light of the daily scrutiny and the threat of the attack. For years, Google offered A similar repetition program Advanced protection that focuses on adding Additional layers It is monitoring and safety for Google accounts for vulnerable users, an essential part of the lives of many digital people that can be destroyed if exposed to danger. Now, Google protects advanced with a set of features Android 16.

On Tuesday, the company announced an advanced protection for phones that run the latest Android version. In essence, the situation is designed about imposing strong safety settings on all applications and services for the data as much as possible and reducing interactions with unprecedented web services, unknown and unreliable individuals previously. The advanced protection on Android is supposed to be as useful and flexible as possible, although it tends to expand the capabilities of AI expanding the fast device to provide monitoring and alerts without the need to completely get rid of the features. However, the situation imposes unimaginable restrictions, such as preventing phones from connecting to the historical 2G data networks and disrupting the Chrome, which can change or break some web functions in some locations.

“There are two categories that we use to defend the user. One of them is clear that you harden the system, so you try to lock things, and prevent many forms of attacks,” says Dave Clearmarakher, Vice -Header of the Engineering Department of the Android Security and Privacy Department. “But two are that you cannot always prevent every attack completely. But if you can discover that you were at risk, you can take a kind of corrective action. In the safety of the consumer on a mobile phone, this detection was never a possibility, so this is one of the big things we have done here.”

This monitoring and discovery possibility, known as login, is used, from end to tip to store unimaginable records in the cloud so that it cannot be accessed by Google or any party, but also in an unintelier or modified form, even if your device and Google account have endangered.

The image may have a mobile phone and the electronic phone

With the permission of Google

Registration and system monitoring tools are common on laptops and desktop computers – not to mention information technology environments in institutions – but providing consumer capabilities on mobile devices is unusual. As with any scheme that raises data from the device and puts it in the cloud, the system offers some new risks, but Google and Google Cloud Services Already Kleidermacher notes many encrypted platforms from one side to users, and Kleidermacher notes that the ability to create unimaginable records cannot be treated or deleted by an invaluable advanced attacker in treating targeted attacks.

“The main innovation here is that you have a script record mechanism to detect the settlement that actually resists tampering with the device,” he says. “It brings the discovery of a storming of the consumer. So if you, as a consumer suspected of a problem and you can’t make sure, you can pull the records from the cloud. You can share it with a safety expert, you can share it with a non -governmental organization, and they can use tools for analysis.”

Another feature that is running virtual and cannot be turned off in advanced protection is the extension of the memory marks in Android (MTE). The feature, which first appeared for the Google Pixel Line and began to adopt it on processors on other devices, is a safety protection of the devices related to how the system management is its memory. If one of the attackers tries to take advantage of a security vulnerability like the so -called temporary store flow, the MT will cause the operation to fail, which leads to the suspension of the attack in its paths. Memory corruption errors are a common tool used by infiltrators, so neutralizing the full class of weaknesses makes it difficult to attack the device.



https://media.wired.com/photos/68236102e26eb5d77efa7115/191:100/w_1280,c_limit/GettyImages-2169510488.jpg

Source link

Leave a Comment