16 Responses

  1. D
    D at |

    Its also important to point out there is work ongoing that incorporates selinux into android. Id have to disagree with the phishing ruling though as I see neither having the advantage here. Just because its corporate approved and “sanitized” says nothing about scum ware inclusion.

  2. Mahou Saru
    Mahou Saru at |

    Any thoughts on file encryption? As mobile devices become more and more powerful with even more storage, we end up carrying our lives on it making it a very bad thing if stolen or lost.

  3. rich
    rich at |

    Maybe a better expression for “at loggerheads” would be “at odds”.

  4. Android 與 iPhone 的安全性 PK - NICA

    […] . 原文出處:Android vs iPhone: Security Models 【吃食】趴趴走* […]

  5. Jam
    Jam at |

    would appreciate if you could update this article in the future to reflect new changes, which should be well worth a bookmark of this page. I also agree that you can add an item with something like “native encryption”

    Also want to say it would be better to show the more detail on each item instead of using win/lose. Sometimes there isn’t such thing as win or lose situation. It’s just how each company views an issue. For instance, some people believe open source isn’t more secure than close source.

    Thanks for the info on SELinux. this feature is a big plus for me.

    I do prefer android a bit more so far except that kill switch ‘feature’ which always makes me feel big brother is watching.

  6. Plan-Net
    Plan-Net at |

    Not only the iPhone but many different mobile devices can represent threats to security in an organisation. Not all mini-netbooks and smartphones are suitable for work – in the quest for a mobile office the need for mobility has to meet security and efficiency requirements in order to be safely adopted in business.
    https://plannetplc.wordpress.com/2010/06/22/quest-for-a-portable-office/

  7. nils
    nils at |

    Just want to say that I like the article and the other one “Android Froyo and Nexus One: Everything we know”. Well done. Waiting for your promised updates.

  8. Gary Walker
    Gary Walker at |

    Perhaps the most important attack vector for malware is social engineering, i.e. tricking the user into harming themselves. Would appreciate a realistic comparison of this for these platforms.

  9. Solving The Android Permissions And Malware Puzzle | Shantanu's Technophilic Musings

    […] one was indeed correct (e.g. The Russian Trojan app). We also know that Android has a very good security model but even then, the rest of the reports also makes one think and focus on why an apps requires the […]

  10. Android: Solving the Malware Puzzle | IPFilter on Linux

    […] one was indeed correct (e.g. The Russian Trojan app). We also know that Android has a very good security model but even then, the rest of the reports also makes one think and focus on why an apps requires the […]

  11. Alexey Bokov’s weblog » Blog Archive » Links for January 2011

    […] Android vs iPhone: Security Models […]

  12. 99% of Android Phones Leak Secret Account Credentials « Software Synergy

    […] this may not be the case and the iOS versus Android operating system security issue is an often hotly debated topic on the […]

Comments are closed.