www. O S N E W S .com
News Features Interviews
BlogContact Editorials

Android Developers Blog: insider attack resistance
By Thom Holwerda on 2018-06-04 04:32:54

In the past, device makers have focused on safeguarding these keys by storing the keys in secure locations and severely restricting the number of people who have access to them. That's good, but it leaves those people open to attack by coercion or social engineering. That's risky for the employees personally, and we believe it creates too much risk for user data.

To mitigate these risks, Google Pixel 2 devices implement insider attack resistance in the tamper-resistant hardware security module that guards the encryption keys for user data. This helps prevent an attacker who manages to produce properly signed malicious firmware from installing it on the security module in a lost or stolen device without the user's cooperation. Specifically, it is not possible to upgrade the firmware that checks the user's password unless you present the correct user password. There is a way to "force" an upgrade, for example when a returned device is refurbished for resale, but forcing it wipes the secrets used to decrypt the user's data, effectively destroying it.

2  Comments - Printer friendly - Related stories
Recent related stories
- How Android engineers are winning the war on fragmentation - 2018-06-10
- How to Android without Google - 2018-06-03
- NVIDIA Shield TV finally gets Android 8.0 Oreo update - 2018-05-24
- Why Android P gestures are a risk worth taking - 2018-05-24
- Google makes two different versions of Android - 2018-05-21
- More related articles
 

Tell a friend
Your full name:
Your email address:
Your friend's email:
Anti-spam measure:
5+2=

News Features Interviews
BlogContact Editorials


WAP site - RSS feed
© OSNews LLC 1997-2007. All Rights Reserved.
The readers' comments are owned and a responsibility of whoever posted them.
Prefer the desktop version of OSNews?