Home | History | Annotate | Download | only in security

Lines Matching full:users

25 environment that ensures the security of users, data, applications, the device,
31 protection for all users of the platform.</p>
38 <p>Android was designed with device users in mind. Users are provided visibility
41 attacks, such as social engineering attacks to convince device users to install
96 users hundreds of thousands of applications.</p>
104 allow users to discover, install, and purchase applications from their Android
106 users and potential customers. Google Play also provides community review,
155 such as the Linux kernel. Google Play provides a forum for users and companies
156 to provide information about specific applications directly to users.</li>
164 users is minimized. These cloud-supported responses can include updating the
344 applications and all application data. Users that change the permissions on an
350 working with the Android platform. On many Android devices users have the
366 data from root users. Applications can add a layer of data protection using
370 then becomes accessible to root users.
373 A more robust approach to protecting data from root users is through the use of
510 <p>Within the device settings, users are able to view permissions for applications
511 they have previously installed. Users can also turn off some functionality
533 <h2 id="how-users-understand-third-party-applications">How Users Understand Third-Party Applications</h2>
534 <p>Android strives to make it clear to users when they are interacting with
547 vision of Android is to have users switching seamlessly between applications at
560 functionality. That approach prevents users from easily understanding and
561 discussing application capabilities. While it is not possible for all users to
563 information about applications easily accessible to a wide range of users. For
564 example, unexpected permissions requests can prompt more sophisticated users to
567 are visible to all users.</p>
625 securing users' data and avoiding the introduction of security vulnerabilities.</p>
655 data within third-party applications installed by users. Applications that
736 Android 4.2 and later support application verification. Users can choose to
772 provided from a central location for users to download as a zip file to their
789 prior to availabilty of a fix and put users at risk. Many OHA members run their
802 users with access to the most recent Android features, as well as security