decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
Secure the Human! It's actually a website... | 381 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
iPhones most ”vulnerable“
Authored by: Anonymous on Friday, May 24 2013 @ 06:42 PM EDT
Note that I did not describe any Android malware as 'viruses'.
The exploits in the OS are usually used for good. If there's
potential for evil they don't get out the door from Google.
As for the apps that ask to steal your passwords, etc,
neither you nor I, nor Google can prevent stupid, and yet
stupid is without doubt a vulnerability. Whether there's
more stupid using Android than iOS is an interesting question.

[ Reply to This | Parent | # ]

iPhones most ”vulnerable“
Authored by: Anonymous on Friday, May 24 2013 @ 10:35 PM EDT
>They are programs that ASK you for permission to install...

There are/were programs on Google Play that did not request
permission to do some of the things that they did.

Once one installs software from places other than Google Play,
the odds of the program requesting all of the specific permissions
they need, drop considerably.

Regardless, the security vulnerability is when permissions are
requested for things that the program has no legitimate need to
do. For example, the Bible study program that requires the GPS
location when starting up. Or the eBook reader that requires
access to the contact list. Or the Bible Study program that needs
to access BlueTooth. Or the text editor that requires an active
Internet connection.

I really wish it was easier to locate FLOSS in the Android app
stores. I've given on finding any FLOSS in any app store run by
either Amazon, or Apple.

[ Reply to This | Parent | # ]

  • android floss - Authored by: Anonymous on Sunday, May 26 2013 @ 12:32 PM EDT
Secure the Human! It's actually a website...
Authored by: Anonymous on Saturday, May 25 2013 @ 10:30 AM EDT
In the end, that's where the real money is....phishing ....

However, I think PJ will agree that if I want to turn on my cofeemaker or
Full-sized TV or my lights or my thermostat from a phone I purchased, the
phone or tablet should not actively prevent an app from getting appropriate
permission from an end user to emit the correct signals.

However, I see the problem as more fundamental:
Operating Systems ASSUME, by default, that Apps are not malicious and
cannot be made malicious, and fail to allow users to discover this easily
and take control when that happens.

(Christenson)


[ Reply to This | Parent | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )