Difference between revisions of "Native App Privacy"

From MgmtWiki
Jump to: navigation, search
(Context)
(Context)
Line 5: Line 5:
  
 
* The first of the [[Laws of Security]] tell us that when an attacker gets to run their code on your computer, it is not longer just your computer any longer.
 
* The first of the [[Laws of Security]] tell us that when an attacker gets to run their code on your computer, it is not longer just your computer any longer.
* There are two parts to [[Privacy]] (the right to be let alone) that are important on a portable computer device, like a smart phone:
+
* There are two parts to [[Privacy]] (the right to be let alone) that are should be subject to [[User Consent]] on a portable computer device, like a smart phone:
** Attention  
+
** Attention, or just how annoying do we want a device in our immediate possession to be?
** [[User Private Information]]
+
** [[User Private Information]] that we would like to be able to share only with permission.
 
* Android App list of [[Data Category|Data Categories]] that require [[User Consent]]. https://support.google.com/googleplay/answer/6270602?hl=en
 
* Android App list of [[Data Category|Data Categories]] that require [[User Consent]]. https://support.google.com/googleplay/answer/6270602?hl=en
 
* Apple iPhone App Requesting Permission: https://developer.apple.com/design/human-interface-guidelines/ios/app-architecture/requesting-permission/
 
* Apple iPhone App Requesting Permission: https://developer.apple.com/design/human-interface-guidelines/ios/app-architecture/requesting-permission/

Revision as of 13:53, 7 August 2018

Full Title and Meme

An application that is installed on a user's computing device can be given access to some parts of user Privacy.

Context

Problems

Solutions

References

Other References