Google’s Advanced Protection for Vulnerable Users Comes to Android

Spread the love

With the rise Technology giants like Apple, Google and Microsoft have spent the past few years to determine how they can protect digital life in their most vulnerable, weak users around the world. On mobile, the Apple’s iOS lockdown mode turned on In 2022 there was a combined attempt to spread the irrational effectiveness in favor of maximum protection —Stopped in a trade Most users do not want to be created, but it can be very valuable for any public personality, worker, journalist, or threatening to investigate daily investigations and attacks. For years, Google has offered an offer Programs for similar population Advanced Protection is called which concentrates toward adding Extra level About observation and protection on Google Accounts in poor users, many people are a key part of digital life that can be destructive if compromised. Now, Google is expanding advanced protection with a suite of features Android 16The

Tuesday, the company has announced a Advanced Protection Mode For phones that run the new version of Android. In the main part of it, the mode is designed to impose strong security settings on apps and services as possible in silo data and to reduce the interaction with unsafe web services and previously unknown, unfaithful people. Advanced protection in Android is meant as much as useful and flexible as possible, though, Google is leaning on Google’s fast-growing on-division AI scanning capabilities to provide observation and alert without completely eliminating features. Nevertheless, the mode imposes restrictions that cannot be stopped, such as blocking phones, connecting to Historic Tihasic 2G data networks and disable Chrome’s JavaScript optimizer, which can change or break some web effectiveness on some sites.

“We use two classes to protect the user,” but two are not always to prevent every attack, but if you can identify that you can take some correctional steps, “said Vice President of the Android Department of Protection and Privacy Department. This detection was never a possibility to protect consumers on mobile, so one of the big things we did here. “

This monitoring and detection capabilities, which are known as the intrusion logging, use the last-to-end encryption to save logs from your device so that it is compromised with your device and Google account it cannot be accessed by Google or any party, but in a size that cannot be removed or modified.

Can have electronics mobile phones and phones in the picture

Courtesy of Google

Laping and system monitoring tools are common on laptops and desktops – not to be mentioned in the Enterprise IT environment – but it is even more unusual to provide capacity for customers on mobile devices. Like any scheme that takes data from a device and keeps it in the cloud, the system introduces some new risks but Google and Google Cloud Services Already run For users, many end -to -end platforms and clidermacles have noted that the ability to create an irrelevant log that is not driven by or deleted by a sophisticated invader is invaluable in addressing target attacks.

“The key innovation here is that you have an audit log process to identify the agreement that is actually resistant to the device tampering,” he said. “It is bringing intrusion to the consumer so if you are suspected of a problem as a customer and you are sure you can pull the logs from the cloud you can share them with a security specialist, you can share them with an NGO and they can use tools for analysis.”

Another feature that cannot be stopped by default and advanced protection is Android’s memory tagging extension (MTE). The feature, which debuted for Google’s Pixel Line and began to be adopted on other devices, a hardware protection related to how a system manages its memory. If an attacker tries to use memory weaknesses like the so -called buffer overflower, the MTE process may fail, stops attacking its tracks. Memory corruption bugs are a common equipment used by hackers, so netting the whole class makes it even more difficult to attack a device.

Leave a Reply

Your email address will not be published. Required fields are marked *