Sample Header Ad - 728x90

Comparison of isolation methods in Android

2 votes
0 answers
158 views
Where can I find a table that compares what information is and is-not accessible from an Android app with various isolation methods? I need to install a piece of malware on my Android device. This is definitely a very dangerous app that was designed by someone powerful, malicious, and actively trying to attack me. I don't want them to learn anything about my device, and I definitely don't want their app to see any data on my device or be able to interact with other apps or files on the device (even with an accidental tap caused by me clicking something after the app spawned maliciously-timed INTENT). On desktop, I use QubesOS. So I have no issue running and playing with malware. I just fire-up a new DispVM, and I'm very confident that it's isolated. Android, however, leaks so much info to apps that I'm not sure how best to go about this. I've considered a few isolation methods: 1. Do nothing (default app "sandboxing"), 1. Install in a Work Profile (eg [Insular](https://f-droid.org/packages/com.oasisfeng.island.fdroid/)) , 1. Install in a new User Profile, 1. Buy (and install it on) a second phone, or 1. Something even better? Is there any table that lists all of the data that is made available to apps that are compartimienalized with each of these methods?
Asked by Michael Altfield (526 rep)
Sep 1, 2024, 02:35 PM
Last activity: Sep 1, 2024, 07:30 PM