Exploring Security and Permissions
No exploration of modern development platforms or operating systems is complete without discussing security. In Android, security spans all phases of the application life cycle—from design-time policy considerations to runtime boundary checks. In this chapter you’ll learn Android’s security architecture and understand how to design secure applications.
Let’s get started with the Android security model.
Understanding the Android Security Model
Let’s dive right in, to cover security during the deployment and execution of any Android application. To deploy an Android application, it must be signed with a digital certificate in order for you to install it onto a device. With respect to execution, ...