ewan
|
2009-10-15
, 17:00
|
|
Posts: 445 |
Thanked: 572 times |
Joined on Oct 2009
@ Oxford
|
#81
|
The Following 4 Users Say Thank You to ewan For This Useful Post: | ||
|
2009-10-15
, 20:08
|
Posts: 286 |
Thanked: 259 times |
Joined on Jan 2006
@ Cambridge, England
|
#82
|
The Following 2 Users Say Thank You to richie For This Useful Post: | ||
|
2009-10-16
, 12:52
|
Posts: 94 |
Thanked: 28 times |
Joined on Oct 2009
|
#83
|
|
2009-10-16
, 12:54
|
|
Posts: 2,535 |
Thanked: 6,681 times |
Joined on Mar 2008
@ UK
|
#84
|
Ok, on the wiki page Elena replied about the security architecture. I still have few questions/clarifications but don't really want to clutter the page (even in discussion mode). Should I ask them here (does Elena reads this thread?) or should I edit the page? (then we need to find a way to do more constructed answer/replies because it won't be readable long)
|
2009-10-16
, 12:58
|
Posts: 94 |
Thanked: 28 times |
Joined on Oct 2009
|
#85
|
|
2009-10-16
, 13:24
|
Posts: 168 |
Thanked: 265 times |
Joined on Oct 2009
@ London, UK
|
#86
|
@qgil are there plans to port over Fluendo codecs to Maemo, or Moonlight to Maemo?
The Following 2 Users Say Thank You to zaheerm For This Useful Post: | ||
|
2009-10-16
, 13:37
|
Posts: 94 |
Thanked: 28 times |
Joined on Oct 2009
|
#87
|
If you use your own kernel, you are the one to set the security policy for the device, meaning that your SW in this case can make calls, send sms and so on (for example). Please note that the list of protected resources on the slide is given just as example (to show the possible granularity level), so it doesn't mean that we would have exactly these resources.
Can open applications use the privilege mechanisms in the Open and Closed modes?
Originally Posted by Elena ReshetovaI guess the question is "Can the applications access protected resources in both modes?" I hope I got the question correctly. The answer is that the Device Security Policy (slide 7) defines the resources can be potentially granted to the SW coming from a particular SW source. When one uses the Nokia signed kernel, the device security policy is defined, and user can't change it. If one uses its own kernel (or community kernel for example), he (or community) is the one to define/change the device policy. This means that one can, for example, change the policy in the way that the SW coming from the maemo.org gets access to all protected resources (of course some content becomes unavailable when one switch to its own kernel, for example DRM). However, again, it is possible only while using your own kernel.
|
2009-10-23
, 13:52
|
Posts: 3 |
Thanked: 0 times |
Joined on Mar 2007
|
#88
|
|
2009-10-27
, 04:17
|
Posts: 2,802 |
Thanked: 4,491 times |
Joined on Nov 2007
|
#89
|
|
2009-10-28
, 09:51
|
|
Posts: 3,105 |
Thanked: 11,088 times |
Joined on Jul 2007
@ Mountain View (CA, USA)
|
#90
|