Content deleted Content added
Alexeyevitch (talk | contribs) c/e |
m fix links |
||
(One intermediate revision by one other user not shown) | |||
Line 285:
The [[flash storage]] on Android devices is split into several partitions, such as <code>/system/</code> for the operating system itself, and <code>/data/</code> for user data and application installations.<ref>{{cite news |last=Raja |first=Haroon Q. |url=http://www.addictivetips.com/mobile/android-partitions-explained-boot-system-recovery-data-cache-misc/ |title=Android Partitions Explained: boot, system, recovery, data, cache & misc |newspaper=Addictivetips |publisher=Addictivetips.com |date=May 19, 2011 |access-date=September 15, 2012 |url-status=live |archive-url=https://web.archive.org/web/20120922024642/http://www.addictivetips.com/mobile/android-partitions-explained-boot-system-recovery-data-cache-misc/ |archive-date=September 22, 2012 }}</ref>
In contrast to typical [[desktop Linux]] distributions, Android device owners are not given [[superuser|root]] access to the operating system and sensitive partitions such as <code>/system/</code> are partially [[read-only memory|read-only]]. However, [[Filesystem Hierarchy Standard|root access]] can be obtained by exploiting [[Vulnerability (computing)|security flaws]] in Android, which is used frequently by the [[#Open-source community|open-source community]] to enhance the capabilities and customizability of their devices, but also by malicious parties to install [[computer virus|viruses]] and [[malware]].<ref>{{cite web |author=Jools Whitehorn |url=http://www.techradar.com/news/phone-and-communications/mobile-phones/android-malware-gives-itself-root-access-1062294 |title=Android malware gives itself root access | News |date=February 10, 2012 |publisher=TechRadar |access-date=September 15, 2012 |url-status=live |archive-url=https://web.archive.org/web/20120901170804/http://www.techradar.com/news/phone-and-communications/mobile-phones/android-malware-gives-itself-root-access-1062294 |archive-date=September 1, 2012 }}</ref> Root access can also be obtained by [[Bootloader unlocking|unlocking the bootloader]] which is available on most Android devices, for example on most [[Google Pixel]], [[OnePlus]] and [[Nothing (company)|Nothing]] models <code>OEM Unlocking</code> option in the developer settings allows the user to unlock the bootloader with [[Fastboot]], afterward, custom software may be installed. Some OEMs have their own methods. The unlocking process [[factory reset|resets the system to factory state]], erasing all user data.<ref>{{cite web |date=April 29, 2016 |title=Bootloader, Recovery, and the joy of unlocking |url=https://ifixit.com/Anleitung/Bootloader+Recovery+and+the+joy+of+unlocking/62398 |website=iFixit }}{{Dead link|date=August 2023 |bot=InternetArchiveBot |fix-attempted=yes }}</ref> Proprietary frameworks like [[Samsung Knox]] limit or block attempts at rooting. Google's [[
=== Software stack ===
Line 377:
The documents revealed a further effort by the intelligence agencies to intercept Google Maps searches and queries submitted from Android and other smartphones to collect ___location information in bulk.<ref name="angrybirdsatgchq" /> The NSA and GCHQ insist their activities comply with all relevant domestic and international laws, although the Guardian stated "the latest disclosures could also add to mounting public concern about how the technology sector collects and uses information, especially for those outside the US, who enjoy fewer privacy protections than Americans."<ref name="angrybirdsatgchq" />
Leaked documents codenamed [[Vault 7]] and dated from 2013 to 2016, detail the capabilities of the [[Central Intelligence Agency]] (CIA) to perform electronic surveillance and [[cyber warfare]], including the ability to compromise the operating systems of most smartphones (including Android).<ref>{{cite web|url=http://www.computing.co.uk/ctg/news/3006021/vault-7-wikileaks-reveals-details-of-cias-hacks-of-android-iphone-windows-linux-macos-and-even-samsung-tvs|title=Vault 7: Wikileaks reveals details of CIA's hacks of Android, iPhone Windows, Linux, MacOS, and even Samsung TVs|website=[[Computing (magazine)|Computing]]|date=March 7, 2017|access-date=April 22, 2018|archive-date=April 12, 2019|archive-url=https://web.archive.org/web/20190412212526/https://www.computing.co.uk/ctg/news/3006021/vault-7-wikileaks-reveals-details-of-cias-hacks-of-android-iphone-windows-linux-macos-and-even-samsung-tvs|url-status=dead}}</ref><ref>{{Cite news|url=https://www.wired.com/2017/03/cia-can-hack-phone-pc-tv-says-wikileaks/|title=How the CIA Can Hack Your Phone, PC, and TV (Says WikiLeaks)|last=Greenberg|first=Andy|date=March 7, 2017|magazine=[[WIRED]] }}</ref>
==== Security patches ====
|