One Article Review

Accueil - L'article:
Source GoogleSec.webp GoogleSec
Identifiant 8486086
Date de publication 2024-04-08 14:12:48 (vue: 2024-04-21 03:06:44)
Titre Comment nous avons construit le nouveau réseau de recherche avec la sécurité des utilisateurs et la confidentialité
How we built the new Find My Device network with user security and privacy in mind
Texte Posted by Dave Kleidermacher, VP Engineering, Android Security and Privacy Keeping people safe and their data secure and private is a top priority for Android. That is why we took our time when designing the new Find My Device, which uses a crowdsourced device-locating network to help you find your lost or misplaced devices and belongings quickly – even when they\'re offline. We gave careful consideration to the potential user security and privacy challenges that come with device finding services. During development, it was important for us to ensure the new Find My Device was secure by default and private by design. To build a private, crowdsourced device-locating network, we first conducted user research and gathered feedback from privacy and advocacy groups. Next, we developed multi-layered protections across three main areas: data safeguards, safety-first protections, and user controls. This approach provides defense-in-depth for Find My Device users. How location crowdsourcing works on the Find My Device network The Find My Device network locates devices by harnessing the Bluetooth proximity of surrounding Android devices. Imagine you drop your keys at a cafe. The keys themselves have no location capabilities, but they may have a Bluetooth tag attached. Nearby Android devices participating in the Find My Device network report the location of the Bluetooth tag. When the owner realizes they have lost their keys and logs into the Find My Device mobile app, they will be able to see the aggregated location contributed by nearby Android devices and locate their keys. Find My Device network protections Let\'s dive into key details of the multi-layered protections for the Find My Device network: Data Safeguards: We\'ve implemented protections that help ensure the privacy of everyone participating in the network and the crowdsourced location data that powers it. Location data is end-to-end encrypted. When Android devices participating in the network report the location of a Bluetooth tag, the location is end-to-end encrypted using a key that is only a
Envoyé Oui
Condensat ability able about access accessible accessory account across actors added addition additional address advantage advocacy against aggregated aggregation airports alerting alerts algorithm allow allowing also altogether always android another anyone app applying approach architectural are areas areas: attached bad baggage been before behind being belongings biggest billion bluetooth both buffered build built busier busy but cafe cafes can cannot capabilities careful center challenges checked chosen coffee come commitment compatible compliant conducted consideration continue continues contribute contributed contributing control controls controls: crowdsourced crowdsourcing data dave decrypt default defense depth design designing details detect detects developed development device devices difficult discard dive does drop during ecosystem effectively either encourage encrypted end engage engaging engineering ensure erase even everyone example exploit feedback find finding first found frequently from full gathered gave global google grant groups had harnessing has have help helpful helping helps here home how identify imagine implemented implementing important improve included including: industry information integration internal ios items its joint keep keeping key keys kind kleidermacher knowledge known last layered left less let like likely limiting limits locate locates locating location locations logs look lose lost main makes malicious manner many may means meanwhile mind minimally minimizing misplaced mitigate mobile more morning most multi multiple near nearby nest network network: never new next non not notification number off offline often only opt other otherwise over overwritten own owner owners participate participating particular people person phone please posted potential powers prioritize prioritizing priority privacy private proactively program protection protections protections: protects provided provides proximity public quickly rate read real realizes receive recover red reduce reliable report reporting reports request requires research researchers rewards risk risks safe safeguards safeguards: safety save secure security see select services settings share shared showing shows someone specification spots stalk standard stationary stay stick strength such surrounding table tag take targeted team testing them themselves these they those three throttles throttling through time times timestamp together took top track tracker tracking trip trying turn typically undergone unknown unwanted unwavering updated use user users uses using valuable version view visit vulnerability ways when where which why will without work works your
Tags Vulnerability Threat Mobile
Stories
Notes ★★
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: