Android Jelly Bean Much Harder To Hack 184
A reader tips this quote from an article at Ars:
"The latest release of Google's Android mobile operating system has finally been properly fortified with an industry-standard defense. It's designed to protect end users against hack attacks that install malware on handsets. In an analysis published Monday, security researcher Jon Oberheide said Android version 4.1, aka Jelly Bean, is the first version of the Google-developed OS to properly implement a protection known as address space layout randomization. ASLR, as it's more often referred to, randomizes the memory locations for the library, stack, heap, and most other OS data structures. As a result, hackers who exploit memory corruption bugs that inevitably crop up in complex pieces of code are unable to know in advance where their malicious payloads will be loaded. When combined with a separate defense known as data execution prevention, ASLR can effectively neutralize such attacks."
+1 headline (Score:5, Funny)
Android Jelly Bean Much Harder To Hack
I can't wait to show this headline to my non-computer-type friends and watch their heads explode.
unix permissions? (Score:2)
here is an idea why not just use unix permission built into linux? give me sudo privileges by default so i don't have to hack it, and let me worry about the security.
Re: (Score:2)
Re: (Score:3)
not really it has a unlocked boot loader which is great but i still don't have sudo privileges and i don't have fine grained permission on a user group read write execute level. not to mention SELinux security which would be great. ideally i would be able to give each app its own permissions to every resource. dose this app get contacts read permission? i say nope it doesn't even know there is a contacts list. does it see my 3g Internet and use it to serve me ads and cost me minutes or toward my date c
Re:unix permissions? (Score:4, Informative)
Then you want a phone with CyanogenMod It's got pretty fine grained control for denying apps certain permissions. Take a look:
http://www.androidpolice.com/2011/05/22/cyanogenmod-adds-support-for-revoking-and-faking-app-permissions/ [androidpolice.com]
Re: (Score:3)
What they really need to do is to include fake data. Some apps just crash when being revoked access to certain things, while giving them fake access to an empty phone book e.g. would be a good way to circumvent this.
Re: (Score:2)
They have that [xda-developers.com] too. Gave up on CyanogenMod for anything but my Nook (it's the only passable mod for it that I've found) when they made their reasoning clear on why that would never, ever be in the mod itself.
Re: (Score:2)
Very cool, thank you
Re: (Score:2)
that's exactly why android's permission model requires users to grant the permission before installation. writing an app that behaves reasonably with all possible combinations of permissions either granted or denied by the user is a nightmare.
Re: (Score:2)
Actually IIRC CM has support to do something like that. Or it was planning to have that feature, I forget.
Either way, the problem was that messing with permissions like that would break some apps for whatever reason.
Applications don't catch SecurityException (Score:2)
Either way, the problem was that messing with permissions like that would break some apps for whatever reason.
It's because the applications don't catch the SecurityException that gets thrown when an application accesses an API that requires a permission that the application doesn't have. This is done on the assumption that the installer will grant all privileges that the application requests, which is true of all official Android releases (and particularly all that come with a lawfully made copy of Google Play Store).
Re:unix permissions? (Score:4, Insightful)
It is a PHONE. Not a fucking workstation.
yes it is a phone but why take out functionality that is already built in.
Every process on Android is run under a different user respecting the permission system built into the Linux kernel.
yes and they have every permission they want not the permissions i want them to have.
Trying to turn your phone into a desktop is pointless.
its not pointless. i want a secure device. and apps that can't steal my data.
Just use the desktop when you need to go that far with it
do you have a desktop you can fit in you pants pocket with a capacitive touch screen, 3g blue tooth and wifi connections, a battery life measured in days and telephony stack?
And if you really want to use your phone, install Linux in a chroot and go to town with sudo.
android already has linux on it its just broken
Re: (Score:2)
Re: (Score:3)
Re: (Score:2)
no but the issue it security of the devise. patching a memory leak on a browser is like putting bars on all of the windows of your house but leaving the garage door wide open. First shut the gurage door in this case give me control over permissions to my devices so i can control what apps can send home as it is every apps has permissions to everything they can think of wifi, cellular connection, contacts, microphone, etc etc etc. why would joe hacker bother trying to exploit a memory leak when he can just g
No phone home? No play. (Score:2)
if we had descent permission we could stop super pony free app from phoning home our stolen information.
For one thing, I thought only Parallax Software had Descent permission. For another, if the application weren't allowed to phone home at least every so often, it'd just error out "can't contact high score server" back to the home screen, just like the various Android app stores do while offline.
Re: (Score:2)
Re: (Score:2)
here is an idea why not just use unix permission built into linux? give me sudo privileges by default so i don't have to hack it, and let me worry about the security.
if you want root, go root your device. please don't act like it's a good idea is give grandma a rooted device off the shelf.
I love when people try and counter hackers (Score:5, Interesting)
Obfuscating your security is okay, but obfuscating the fact you have a bunch of anti-hacks in place seems even better.
I've been looking into anti hacker theory ever since Starcraft 1 maphackers ruined ladder.
Re: (Score:1, Funny)
I was with you right up to your sig where you revealed you've suffered repeated mental breakdowns.
Re:I love when people try and counter hackers (Score:4, Funny)
From my experience with hackers, if you say your platform is more challenging to hack, it attracts more hackers to try and hack it. Never taunt happy fun hackers.
Thats why all hackers target Linux/Unix and leave windows alone, because we all know Windows is nowhere near as secure (or can be as secured) as Linux. Therefore according to your theory, because windows is easy to hack it does not attract hackers.
oh wait...
Re: (Score:2)
That's a bit like saying that Microsoft boasts about Wind
4.2 Jelly Baby (Score:5, Funny)
Will be hackable with a sonic screwdriver.
Re: (Score:2)
ASLR is a good thing but... (Score:5, Interesting)
Address space layout randomisation sounds like a good idea, long overdue, and I'm glad it's slowly being rolled out.
That said - I think it's an extremely sad reflection on the state of software engineering that we simply accept that "memory corruption bugs in complex pieces of code are inevitable".
Memory corruption has such far-reaching consequences - causing the failure of pretty much every assumption of guarantee that it simply shouldn't be possible, let alone inevitable, in any industrial-strength language. We don't accept that, say, integer addition should sometimes randomly fail - although that used to happen back in the days of vacuum tubes. But we found and fixed the problem, and now our hardware is (relatively) trustworthy - yet our software is worse than ever. That we just shrug and accept memory corruption as normal - with an entire ecosystem of cybercrime and cyberwarfare created because of it - and don't seem to even think about why it might be, and how to fix the issue, but just keep slapping half-thought-out bandaid after bandaid is shameful to our profession.
(Insert image of Edsger Dijkstra surveying our burnt-out CloudPad 2.0 PHP/C++/Javascript cyberjungle with a single tear.)
Re: (Score:2)
Isn't the impossibility of memory corruption supposed to be one of the benefits of Java (and other managed-code languages too of course)?
Re: (Score:2)
is that the case though? As CPUs get faster, they require tricks such as cache throughput to keep them running at top speed. Putting code that stops that (eg security code) in there will kill performance.
Also, more security code has a tendency to grow rather large with various side-effects on perf (eg reading from file all the time if you're virus checking everything, so its no longer a write to disk, its a write + read).
This is one of the reasons modern OSs with their super-computer CPUs perform about as f
Re: (Score:2)
eg reading from file all the time if you're virus checking everything
I keep forgetting I was writing a library to track and cache this because all vendor AV is shitty. It's ridicuolously easy to get right.
Re:ASLR is a good thing but... (Score:5, Insightful)
Re: (Score:2)
use a language that treats pointers as opaque immutable objects
tada!
That helps, but using hardware that treats them that way [wikipedia.org] is better.
Or running in a sandbox that enforces descriptor protocols.
For the TL;DR, the link describes an architecture---still in use and now implemented on x86 processors---where buffer overflow is impossible.
Writing the same code twice (Score:2)
Nor realizing that that means they didn't get one of the most key points of software development: That you never write the same code twice
So how should one design an application for portability to both Windows Phone 7 and another handheld platform without either A. writing the same code twice (WP7 can't run a lot of languages other than C#) or B. paying hundreds of dollars per year to Xamarin?
Re: (Score:1)
I've tried suggesting that software should be held to the same standards - oh, you should have seen the lo
Re: (Score:1)
I've tried suggesting that software should be held to the same standards - oh, you should have seen the looks I got.
I've worked with gizmos built for an industry where by law the software has to follow a complex development and testing process with a stack of paperwork six miles high to prove that it's certified for use. The end result is bugs don't get fixed because the manufacturers can't afford to rerun the certification process. Worse than that, even when the bugs do get fixed, end-users don't want to install the new software because they've learned to work around the old bugs and don't want to have to deal with new
Re: (Score:2)
I remember a TV show about how the Russians built the Proton rockets. Instead of modeling, testing, checking and being safety conscious, they built the rocket, tested it---and it blew up. So they did it again. And it blew up, again. So they did it again. And again. And again. Until it worked. Net result was a booster more powerful than the Saturn V (AFAIK). Quite a different mode of working.
Along the way they also learned that their observation bunkers were to
Re: (Score:2)
Not that the Soviets didn't do any modelling and testing, but your analysis of their method overall isn't wrong - except that they never accomplished anything like the Saturn V. Even a modern Proton-M is only about 1/6 as powerful. Their N1, which was Saturn V class, blew up all 4 times they tested it and then they ran out of money. The method works with small things that you can afford to build a bunch of times, but with big expensive things it starts to be cheaper to just do the testing.
Re: (Score:2)
Re: (Score:2)
And not all hardware followed GP's model either.
I remember a TV show about how the Russians built the Proton rockets. Instead of modeling, testing, checking and being safety conscious, they built the rocket, tested it---and it blew up. So they did it again. And it blew up, again. So they did it again. And again. And again. Until it worked. Net result was a booster more powerful than the Saturn V (AFAIK). Quite a different mode of working.
Along the way they also learned that their observation bunkers were too close to the rocket and not as blast proof as they had hoped. I'm not saying that this is necessarily the best way of working, just that there are other ways to do things if your values are somewhat different.
I love the Soviets.
Re: (Score:2)
I think the problem is trying to standardise and certify things which can't be.
We should start with the small things which can be standardised. For example, every programmer should know how to sanitise database inputs from the user, and check that buffers can't overflow, and always apply that knowledge if they want to be considered competent.
Re: (Score:2)
Who cares about that shit anyway, they scoffed. We're here to do low-quality work at the lowest price...you think we're building this software to last?
Precisely. Who's still going to use programs written in Cobol in the year 2000?
Re: (Score:2)
It's because we don't have professional standards for software engineers the same way as we have for other types of engineers. Software is still in the "bridge collapse" phase. At one time, anyone could build a bridge. You know what happened? A lot of them fell down, and that was just considered normal. Eventually, society got fed up with that crap and made standards, with jail time for violators.
I see you're advocating a large increase to the cost of software for very little gain in actual reliability. Any proper engineer (or True Scotsman) would know that it is important to balance cost and benefit; for a significant fraction of applications, that balance is firmly towards the cheap end. Guess what? Most of the cheap software is also perfectly fine for its purpose after a few iterations. (Well, that's true if we exclude anything written in PHP, which appears to be the only language and community e
Inconsistent languages are cheaper to use (Score:2)
PHP, which appears to be the only language and community ever to actively hate consistency to the point of working directly against it
I agree with you. However, PHP hangs on in part because entry-level web hosting plans that offer only PHP are often cheaper than plans allowing other, more consistent languages. Case in point: visit this page [securepaynet.net], click "Linux plan details", and search for "Language Support".
Re: (Score:2)
That said - I think it's an extremely sad reflection on the state of software engineering that we simply accept that "memory corruption bugs in complex pieces of code are inevitable".
I don't get what is so sad about this. It seems to me like people have realized that mistakes can and do happen and the exact nature of a mistake in this sort of context is often unpredictable, so you can either roll out patches after the error has been discovered (and a number of devices have been hacked) or you can build in measures that makes the system fault tolerant.
Of course the ideal situation is one where there are no bugs ever and we can full predict every single interaction between every single li
Re: (Score:2)
How is this an admission that memory corruption is inevitable?
I see it as defense in depth - the application is the first line of defense against memory corruption (usually caused intentionally). If that wall fails, the OS has a wall of its own to help protect the system as well.
A well-written program would check its inputs, bu
This doesn't affect the most important issues (Score:1)
In practice (Score:2)
Apple is further than Android. Sure, the app has to ask for permission, but whom does it ask? The end user. The end user is asked to agree to *bunch of things* to get his new app that he just chose out of a gazillion other apps. At that point in time, the end user is determined to get the app on his/her device and is willing to agree to anything because they already decided they want the app. In practice, those explicit permission grants mean nothing because for all practical purposes, over 50% of end user
Re: (Score:3)
AppsLib and Amazon Appstore (Score:2)
All I can think of is initially exposing devices to a curated version of the Play Store ala Apple
AppsLib tries to do this: it ranks "approved" applications higher than other applications. Amazon Appstore is also a curated store and the default store on Kindle Fire tablets.
Oberheide not so positive on Android Bouncer (Score:3)
A quick look at Oberheide's site shows a talk from a week ago at Summer Con detailing problems with Google's 'Bouncer' system, designed to detect malicious apps before they enter the Android Market:
http://jon.oberheide.org/blog/2012/06/21/dissecting-the-android-bouncer/ [oberheide.org]
http://jon.oberheide.org/files/summercon12-bouncer.pdf [oberheide.org]
The executive summary:
Bouncer doesn't have to be perfect to
be useful
â-- It will catch crappy malware
â-- It won't catch sophisticated malware
â-- Same as AV, IDS,
â-- How much does Bouncer raise the
bar?
â-- Currently: not much
â-- Future: hopefully more?
Re: (Score:2)
My apologies.
What's going on here? (Score:5, Insightful)
I'm reading through this thread, and the standard response made by anyone who disagrees with a post is to either call them a moron, idiot, motherfucker, or to insinuate they are gay.
How about this? If you guys think that a post is inaccurate or simplistic - consider responding and explaining why the post is wrong. If you can't do that, then maybe your level of understanding on this topic is lower than you think it is.
I mean, come on. I realize this is Slashdot, and there are always a few people like that hanging around - but this story seems to be attracting an inordinate number of guys that have nothing to offer but anger and venom.
Re: (Score:2)
I'm reading through this thread, and the standard response made by anyone who disagrees with a post is to either call them a moron, idiot, motherfucker, or to insinuate they are gay.
How about this? If you guys think that a post is inaccurate or simplistic - consider responding and explaining why the post is wrong. If you can't do that, then maybe your level of understanding on this topic is lower than you think it is.
I mean, come on. I realize this is Slashdot, and there are always a few people like that hanging around - but this story seems to be attracting an inordinate number of guys that have nothing to offer but anger and venom.
Dude, is this your first time on the internet?
It's pretty much immutable fact that any argument that does not involve profanity and/or the questioning of the original posters sexuality is not going to be read or replied to.
Welcome to the internet, everyone here are assholes.
Re: (Score:3)
Could you perhaps provide a sketch of your plan so we can better understand?
Simple Minded Question (Score:3)
Re: (Score:1)
typed registers are more useful for this problem. harvard machines use two memory interfaces, which preclude any multiplexing gains
in both bandwidth and capacity.
i guess you could divide the address space, but the X bit does that perfectly well.
Re:Simple Minded Question (Score:4, Informative)
Harvard architecture parts are still around but largely confined to microcontrollers and the simpler DSPs at this point. The separation doesn't fix the software problem of buffer over/underruns. It just means you can't easily spill over into a code segment and do nasty things as a byproduct of that. You can still do dirty things in the data segment, though.
Re: (Score:2)
JIT compilers are necessary for today's workloads. These pretty much require that you are allowed to execute code you just wrote to your data segment.
iOS without JIT (Score:2)
Re: (Score:2)
Are most iOS applications written in a Java-like language?
Objective-C (Score:3)
Are most iOS applications written in a Java-like language?
No. iOS applications don't need recompilation because they are written in the unmanaged language Objective-C, perhaps with some C++, except for those applications that run mostly inside a UIWebView which are written in JavaScript. The W^X enforced on applications other than Safari's JavaScript interpreter is stricter than that on platforms allowing general recompilation: no page designated for writing can ever switch to being designated for execution, nor vice versa, without being cleared first.
Inept programming (Score:2)
memory corruption bugs that inevitably crop up in complex pieces of code...
Well, if they didn't use an OS written in C, or they used a static verifier, they wouldn't have that problem.
Address space randomization only protects against inept attackers. If the attacker can get anything running at a low privilege level, and there's an overflow exploit that lets them look into the address space they're attacking, they can find whatever is being moved around.
Address space randomization at best turns attacks into system crashes.
Re: (Score:3)
But it may be hard to look around the memory space using the code you can fit into a specific buffer under/overrun.
Turning attacks into system crashes is a good thing, because it means the admin will notice something is wrong, and it'll take ages for the attacker to succeed (which means the attacker will probably realise it's pointless and not try, which means no crashes).
Re: (Score:2)
Address space randomization at best turns attacks into system crashes.
right, and after a newly installed app crashes, how many times do you keep re-starting it? or do you just uninstall it and install one of the other 1k apps that do the same thing?
seems like a pretty useful result to me.
Re:How stupid they think hackers are? (Score:5, Interesting)
Game hacks are different from hacking a device where you DON'T already have root access. Typically with game hacks you are tweaking the existing behavior of an app and you have full write access to its memory to do so. With hacking a device or app you DON'T have this access, you need to get creative and exploit bugs in the app to write to memory you wouldn't normally be able to.
One example of an attack ASLR may be effective against is a stack smash. Without ASLR, if I run a program in a specific way and say, load a data file of my choosing, I may be able to assume it will get loaded into the same place in memory every time. So I can record that address, and then I can use a buffer overflow attack (perhaps using a field loaded from the same data file) to write to my stack and place the address on there. The OS then thinks my data file should be run next as code and then I can do whatever I want with the permissions of the current app.
With ASLR the location of my data file may change each run, so I can no longer hardcode an address, so now I either have to find some way to get code in a place in memory that doesn't move or find some other avenue of attack and give up on the stack smash.
(I don't do this sort of stuff so I might have gotten some details wrong but I think that's the gist of it.)
Re: (Score:2, Insightful)
Randomization doesn't make the attack impossible; It simply reduces the number of times it works to some fraction of the original. It's like using a salt on a crypto function: It increases the number of times the attack needs to be performed before it'll work. Although the locations in memory are random, there have to be API calls and such to pull those locations. If your bootstrap code calls those APIs... eventually it'll hit the right offset and your code will run in its entirety, you'll get the locations
Re: (Score:2)
Re: (Score:1)
Well considering ASLR was first implemented on 32 bit systems like OpenBSD, Windows, Linux, etc. I'd say that the people that fucking invented it know a little more than you do.
Re: (Score:3)
Re: (Score:2)
are you sure it wasn't emulated 32-bit addressing? 64-bit Alpha Windows 2000 was never widely released. it was dropped in favor of the itanium version.
Re: (Score:2)
Actually, you're wrong. On IA-32, a non-executable bit is implemented by using the segmentation features of X86. Data is set to be the whole address space above the lowest data page. Code is set to be everything below the highest code page. In this way, basically, the stack is marked non-executable for no performance impact.
The rest of the address space is both data and code, and can be executed or altered. Memory protections are used to make executable pages non-writable; while non-executable data p
Re: (Score:2)
I'll give you a hint from the Abstract
We conclude that, on 32-bit architectures, the only benet of PaX-like address-space randomization is a small slowdown in worm propagation speed.
Re:How stupid they think hackers are? (Score:5, Informative)
Bullet-proof vests are security through obscurity! They're not going to stop the attack, it just means etc.
The point of ASLR is that shitty code that got pwned by buffer overflow 100 times out of 100 now will be pwned one time out of (pow(8, sizeof(void*))/RANDOMIZATION_STEP).
If randomization can place it at any 4k page in 32 bit space, you get 1/1048576 probability malicious code works. With 16 bit steps for ASLR, you get 1/65536. Sure can be bruteforced, but that's not very applicable to client applications, especially considering the app will most likely crash every time you guess wrong.
Re:How stupid they think hackers are? (Score:5, Interesting)
Usually stack exploits only get a few bytes worth of executable code before everything will crash. Buffers aren't infinite in size.
If the attacker has 100 bytes worth of code that will be executed, in that space he needs to find where the rest of his code is in memory. Its difficult to find it with ASLR while staying inside your code budget.
Re: (Score:3)
And if the stack is read-only you basically get 1 instruction, the address for a return/jump/etc. And every time you fail you (most likely) crash.
Re: (Score:2)
And if the stack is read-only you basically get 1 instruction, the address for a return/jump/etc.
I think you meant "non-executable". A read-only stack would be nearly useless. (It would at least be practically invulnerable to stack-based buffer overflows, but only because no buffers could be stored on the stack.)
Re: (Score:2)
Oops, yeah, heh. See my previous post, I meant to refer to ASLR + non-executable stack/heap + read only code pages :)
Re:How stupid they think hackers are? (Score:5, Interesting)
This is security through obscurity; It is not going to stop the attack, it'll just mean they need to do it N times before it's more likely than not to complete.
With that definition you could also define any encryption algorithm as "security through obscurity". If N is large enough it really doesn't matter in practice.
And ASLR + data execution prevention + read only code pages makes it a LOT harder just to run any "bootstrap" code you might write to search for randomly assigned addresses in the first place - if you can't execute the heap or stack, you mostly likely need to trick the processor into jumping to some existing code that can do something more interesting for you, and if you jump to the wrong location in random memory don't expect to get another chance on that run.
It not only greatly reduces the chances of very clever malware from succeeding, it greatly reduces the pool of capable hackers who can even try...
Re:How stupid they think hackers are? (Score:5, Informative)
It's not "security through obscurity" any more than, say, encryption is. With encryption, you can also get the right answer by guessing enough times.
Memory layout randomisation is actually worse for the attacker, because every failed attempt at running the malicious code will cause the app to crash, so someone will notice something is wrong (or simply uninstall the app) long before it succeeds.
Re: (Score:3, Informative)
The APIs are loaded in the procedure linkage table, referenced at an offset. Basically a PLT call is done by jumping to %epc+OFFSET, where OFFSET is the distance between the current position in the library and the position of the entry in the PLT to make a particular call. At that position a call is actually made, though it may be unresolved; if it's the first time that function has been called, the PLT executes a small piece of code to link that function, resolving and caching its load address. Then or
Re: (Score:2)
This is security through obscurity
i don't think that means what you think it does.
When you're writing malware, you don't have to get 100% of your target... 5% is valuable too. Or even 1%
1. 100% is much more valuable than 5%
2. the people with non-compromised devices will be much happier.
Re:How stupid they think hackers are? (Score:5, Informative)
Re: (Score:2)
I really wish I had some mod points for you.
Re: (Score:3)
I really wish I hadn't run off the edge of my trackpad and accidentally modded GP "redundant", forcing me to post this and undo all my mods in the thread.
AGAIN.
Re: (Score:2)
yeah there really should be an easy system to undo your own mods.
i don't see how it could be abused, you don't need to get the points back, hell it could even cost an extra point.
the definitely store which comments you've modded which is why you can't mod the same comment twice.
i'm assuming they'd also store what your mod was.
Re: (Score:1)
derp-dee-derp-dee-doo!
jackass
Re:How stupid they think hackers are? (Score:5, Informative)
> Windows - or it's compilers - have always had data and code location randomization
False. ASLR was added in Windows Vista
> One popular method of establishing this is to rely on fingerprints.
Unapplicable to ASLR.
> Google is adding something that other OSes have had for decades and making a huge noise about it
False. a) Most OSes got it in late 2000's, b) ASLR is in Android since ICS and it's just a tick in feature list, not "huge noise"
Fresh account, single post, praising Windows and bashing Google in the same minute as article with a huge lacking in facts department. Yup, it's another sockpuppet troll. Hope the idiots modding you up get their due from metamods.
Re: (Score:2)
ASLR and DEP (Score:2)
Re: (Score:2)
Re: (Score:2)
Basically true while being 100% false.
Only on slashdot.
Businesses still use ten-year-old Windows XP (Score:2)
Six years in IT industry is eternity.
Then explain why so many businesses are still using a desktop OS from 2002.
Re: (Score:2)
I have been doing game hacks (trainers and multiplayer hacks) on Windows for over a decade. Windows - or it's compilers - have always had data and code location randomization. As a result we don't rely on specific code addresses but make our code universally working anywhere. One popular method of establishing this is to rely on fingerprints. Instead of hard coding addresses, you provide fingerprint that finds the right place first. Lets say you have a specific code. Then your fingerprint might be as follows: 90 32 ?? ?? ?? ?? 30 ?? ?? ?? 90 90 90 90 ?? ?? 32 40 4B ?? Then you will run thru the code searching for such piece of code. Anything can be in place of ??, such as other addresses. Sure, you can't hard code anymore.. but your code will be much better after adding this kind of function because then it will also work between all versions of software, even if updates. So basically Google is adding something that other OSes have had for decades and making a huge noise about it, while it actually establishes nothing and even forces hackers to deliver better code. It seems like Google does not know at all what they're doing with their OS.
How did this get modded troll? Someone on google's android team must have a slashdot account...
Re: (Score:3)
How did this get modded troll? Someone on google's android team must have a slashdot account...
It was so off the mark, the moderator must have thought it was a joke.
Memory layout randomisation means intentionally loading code at random locations, to make it as hard as possible for the hacker. The GP is confusing this with not having fixed locations for code, which means it *may* be loaded at different locations (but usually is loaded to a location close to the previous one). The latter has been around for decades, but the former has only become common during the last decade.
It's like the difference b
Re: (Score:2)
He used a subscriber account to read the story early, type up a rather lengthy response, and then posted it using a brand-new account. You can tell this because his comment was posted in the same minute as the article, yet clearly took more than one minute to post. Astroturfers seem to use this method to post scathing commentary about company X (Google seems to be the most common), while avoiding the permanent karma hit (and recognition as an astroturfer) to their subscriber account.
It could also just be
Re: (Score:2)
Runs a treat. Got it from here [xda-developers.com].
Re: (Score:3)
I'm risking getting a little trollish myself, but I was just joking about this particular issue in an earlier story.
Aside from the reference models, very slow roll-outs and platform fragmentation in the Android ecosystem is, I think, a real and irritating problem. I think that's fair for us to talk about it, if only because I'd like to see manufacturers and carriers do a better job.
Re: (Score:1)
It's mostly a problem for developers as they can't just use nice new features without cutting a huge chunk of user base or coding in feature detection, lazy loading and fallbacks.
Average users don't care for it much as long as they get their Angry Birds and Facebook. Manufacturers don't care for it much as long as users don't care for it much.
If users were leaving brands and platform in droves because lack of updates made their phone useless (for example, because most popular apps require latest OS features
Re: (Score:3)
I'm sure you're right. If enough customers cared, the carriers and manufacturers would care.
And I'm nobody important so my opinion isn't really worth anything, but as both an amateur developer and even just as a user I get a little cranky about all the new (and new-ish) phones not getting new software.
I'd like to have things like Google Now, the offline voice stuff, etc. I can get a lot of that stuff on my phone in one way or another, but you can't help but think to yourself, "Apple users don't have this
Re: (Score:3)
On the other hand, the first iPhone came out in the U.S. on June 29, 2007 and the first Android phone on October 22, 2008, so Google introduced the tech into its line of phones at about the same delta-relative-to-initial-release as Apple. As you note, Apple had a head start.
Re: (Score:2)
Yeah, my comment about Apple's head start was _intended_ to draw attention to the way the summary was castigating Google's alleged tardiness, when in reality they're only a handful of months behind their major competition in _mobile_ OS's. I thought the article summary was quite trollish when it was talking about how Google has "finally implemented an industry standard defence" and I was trying to point that out - I wasn't trying to troll myself!
I appear to have been widely misinterpreted, unfortunately. I
Re: (Score:2)
Thanks for the pointers.
However, I was more interested in Android's direct competitors, i.e. other mobile operating systems. I am certainly aware that desktop/server OSs have had ASLR for quite a while. (Although I don't think MULTICS would have had it... I read that ASLR was only invented in 2001. Maybe it existed earlier but not under that name?)