The Following User Says Thank You to Navi For This Useful Post: | ||
|
2008-04-15
, 22:47
|
Posts: 373 |
Thanked: 56 times |
Joined on Dec 2005
@ Ottawa, ON
|
#42
|
The Following User Says Thank You to mwiktowy For This Useful Post: | ||
|
2008-04-16
, 00:02
|
Posts: 66 |
Thanked: 17 times |
Joined on Apr 2008
|
#43
|
|
2008-04-16
, 00:37
|
|
Posts: 868 |
Thanked: 474 times |
Joined on Oct 2007
@ Capital District, NY, USA
|
#44
|
Oops! I said that Android is likely to replace maemo, when I should have written qtopia - which does have a safe execution environment, and is the reason most analysts believe that Nokia bought Trolltech. As I said, typos happen!
Here's the page at Trolltech that probably represents the future of security on Nokia Linux devices:
http://troll.no/support/consulting/q...archterm=patch
The Following 3 Users Say Thank You to brontide For This Useful Post: | ||
|
2008-04-16
, 06:05
|
Posts: 373 |
Thanked: 56 times |
Joined on Dec 2005
@ Ottawa, ON
|
#45
|
|
2008-04-16
, 14:53
|
Posts: 66 |
Thanked: 17 times |
Joined on Apr 2008
|
#46
|
Security is about layering. To say that something is absolutely insecure because it is missing a single layer is simplifying the topic to meaninglessness.
There are many layers of security that still exist on the tabletOS:
1) It is built on a Linux foundation. Linux developers (especially kernel developers) do think a lot more about security than the average.
3) It is an obscure platform to write an exploit for. Malicious attackers will look to get the most bang for their buck and the tablet is not it. Not exactly a feature that Nokia marketing wants to use but it does help with security somewhat.
4) Linux generally does not run applications as a superuser. After they are installed, apps on the tablet generally run as the user "user" and that gives them much less leverage on the system. They can affect files in /user/home and /media/mmc*, maybe communicate via the various communication interfaces but that is about it.
5) The tablet is not always on and always connected to the network. Being mobile, it is jumping from network to network and spending a lot of the time sitting off and not talking to anyone. Most of the other part of the time, it is connected to an wireless access point that masquerades the network connection and often has a firewall built in. This greatly reduces the opportunity for network-based remote attackers to even try to exploit servers running on your tablet.
The addition of the Wimax line of tablets sheds this significant layer though. Another axiom that goes along with "security is layering"; "Security is also always a trade-off".
So that is a (by no means exhaustive) list layers that provide a security
attempts to have 100% coverage of all possible exploits. Never can any anything ever achieve this goal. The security of the available application trust system is certainly a problem that throwing out buzz-phrases like "sandbox" is not going to solve ... sandboxes can be breached too
|
2008-04-16
, 15:04
|
Posts: 66 |
Thanked: 17 times |
Joined on Apr 2008
|
#47
|
SXE is SELinux rebadged. It provides the exact same thing. I am curious why they reinvented the wheel or whether they are just starting with SELinux and culling some flexibility to make it more streamlined.
|
2008-04-16
, 18:42
|
|
Posts: 107 |
Thanked: 26 times |
Joined on Jan 2008
@ New Jersey
|
#48
|
The Following User Says Thank You to Securix For This Useful Post: | ||
|
2008-04-16
, 18:55
|
Posts: 5,335 |
Thanked: 8,187 times |
Joined on Mar 2007
@ Pennsylvania, USA
|
#49
|
I've been in too many places where SSID's come up as "FREE INTERNET" or "PUBLIC ACCESS POINT" and then don't connect to anything. That leads me to wonder about what it really is.
Heck if you really wanted to play a gag, have Apache serve up porn to everyone who connects to it
|
2008-04-16
, 19:29
|
|
Posts: 107 |
Thanked: 26 times |
Joined on Jan 2008
@ New Jersey
|
#50
|
I'm most worried about packet sniffers on an open network.