如果安卓从不是沙盒。那Google的官方
回答: 他说的是IOS11的files,你已经内侧过知道是全新的架构?? 由 reaver 于 2017-06-13 3:55
doc是骗人的?
https://developer.android.com/training/articles/security-tips.html
The following core security features help you build secure apps:
The Android Application Sandbox, which isolates your app data and code execution from other apps.
An application framework with robust implementations of common security functionality such as cryptography, permissions, and secure IPC.
Technologies like ASLR, NX, ProPolice, safe_iop, OpenBSD dlmalloc, OpenBSD calloc, and Linux mmap_min_addr to mitigate risks associated with common memory management errors.
An encrypted file system that can be enabled to protect data on lost or stolen devices.
User-granted permissions to restrict access to system features and user data.
Application-defined permissions to control application data on a per-app basis.
如果你是安卓开发人员需要回炉啊。
安卓实现沙盒是基于文件访问的权限,因此任何app只要拿到root权限就可以入侵其他app。而ios中,从本质上说,越狱的机器一样可以读写app沙盒以外的文件。
不过要定位某一个非本身app的app位置很麻烦。因为目录名称都是经过散列化的随机字符串。
至于说ios11的files就是一个基于fileprovider框架做的app。当然里面很可能用了Apple只让自己用的私有api。这反正也不是第一次了。来自留园官方客户端
|