1 00:00:00,630 --> 00:00:09,000 Android provides a set of key security features which are robust security at the OS level through the 2 00:00:09,000 --> 00:00:17,670 Linux Kernell mandatory application sandbox for all applications secured into processed communication 3 00:00:17,970 --> 00:00:25,110 applications, signing and application defined and user granted permissions applications. 4 00:00:25,140 --> 00:00:33,710 Signing ensures that one application cannot access any other application except through well-defined 5 00:00:33,990 --> 00:00:34,710 IPC. 6 00:00:35,880 --> 00:00:44,280 Android applications can access only their own files and any world accessible resources on the device 7 00:00:44,610 --> 00:00:47,700 due to the sandbox nature of Android. 8 00:00:48,210 --> 00:00:55,380 However, Android can grant additional fine-grained access rights to applications in order to allow 9 00:00:55,770 --> 00:00:57,450 richer functionalities. 10 00:00:57,930 --> 00:01:04,380 Those EXIS rights are called permissions, and they can't control access to hardware devices. 11 00:01:05,070 --> 00:01:09,120 Internet connectivity data or OS services. 12 00:01:09,600 --> 00:01:14,780 Applications can request permissions by defining them in the Android manifest. 13 00:01:15,150 --> 00:01:18,540 Excel male file at the application install time. 14 00:01:18,930 --> 00:01:24,960 Android inspects the list of requested permissions and decides whether to grant them or not. 15 00:01:25,740 --> 00:01:33,000 Once granted, permissions cannot be revoked and they are available to the application without any additional 16 00:01:33,000 --> 00:01:33,720 confirmation. 17 00:01:34,290 --> 00:01:40,470 For some features, explicit user information is required for each accessed object. 18 00:01:40,860 --> 00:01:45,930 Even if the requesting application has been granted the corresponding permission.