Difference between revisions of "Native App Privacy"

From MgmtWiki
Jump to: navigation, search
(Organizational Support)
(Context)
Line 3: Line 3:
  
 
==Context==
 
==Context==
* The day when a personal computer was for running application for the user is long gone, never to return.
+
 
* Today a personal computer depends on cloud based service for nearly all of its functionality.
 
* Some of those sites are willing to use a trusted [[User Agent]], typically a web browser from a well-known and trusted vendor for rendering its content.
 
 
* The first of the [[Laws of Security]] tell us that when an attacker gets to run their code on your computer, it is not longer just your computer any longer.  
 
* The first of the [[Laws of Security]] tell us that when an attacker gets to run their code on your computer, it is not longer just your computer any longer.  
* For the case where the user is not forced to allow an application to run on their personal device, see the page [[Web Site Security]].
 
 
* Android App list of [[Data Category|Data Categories]] that require [[User Consent]]. https://support.google.com/googleplay/answer/6270602?hl=en
 
* Android App list of [[Data Category|Data Categories]] that require [[User Consent]]. https://support.google.com/googleplay/answer/6270602?hl=en
 
* Apple iPhone App Requesting Permission: https://developer.apple.com/design/human-interface-guidelines/ios/app-architecture/requesting-permission/
 
* Apple iPhone App Requesting Permission: https://developer.apple.com/design/human-interface-guidelines/ios/app-architecture/requesting-permission/

Revision as of 13:47, 7 August 2018

Full Title and Meme

An application that is installed on a user's computing device can be given access to some parts of user Privacy.

Context

Problems

Solutions

  • The Native App exposes its name and the web site that backs it in a manner that allows the user to make a meaningful trust decision.
  • Joint use Native Apps are provide to some industries for all to use. It makes the trust decision by the user much more difficult.

References

Other References