Difference between revisions of "Native App Privacy"

From MgmtWiki
Jump to: navigation, search
(Solutions)
(Context)
Line 4: Line 4:
 
==Context==
 
==Context==
  
* The first of the [[Laws of Security]] tell us that when an attacker gets to run their code on your computer, it is not longer just your computer any longer.  
+
* The first of the [[Laws of Security]] tell us that when an attacker gets to run their code on your computer, it is not longer just your computer any longer.
 +
* There are two parts to [[Privacy]] (the right to be let alone) that are important on a portable computer device, like a smart phone:
 +
** Attention
 +
** [[User Private Data]]
 
* Android App list of [[Data Category|Data Categories]] that require [[User Consent]]. https://support.google.com/googleplay/answer/6270602?hl=en
 
* Android App list of [[Data Category|Data Categories]] that require [[User Consent]]. https://support.google.com/googleplay/answer/6270602?hl=en
 
* Apple iPhone App Requesting Permission: https://developer.apple.com/design/human-interface-guidelines/ios/app-architecture/requesting-permission/
 
* Apple iPhone App Requesting Permission: https://developer.apple.com/design/human-interface-guidelines/ios/app-architecture/requesting-permission/

Revision as of 13:51, 7 August 2018

Full Title and Meme

An application that is installed on a user's computing device can be given access to some parts of user Privacy.

Context

Problems

Solutions

References

Other References