Close Menu
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
Facebook X (Twitter) Instagram
Trending
  • Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip
  • T20 World Cup: Quiet contributions from Akshar Patel, Kuldeep Yadav and Ravindra Jadeja justify Rohit Sharma’s spin vision | Cricket News
  • The impact of a sedentary lifestyle on health
  • Bartok: The World of Lilette
  • Economists say the sharp rise in the U.S. budget deficit will put a strain on Americans’ incomes
  • Our Times: Williams memorial unveiled on July 4th | Lifestyle
  • Heatwaves in Europe are becoming more dangerous: what it means for travelers
  • Christian Science speaker to visit Chatauqua Institute Sunday | News, Sports, Jobs
Facebook X (Twitter) Instagram
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
The Daily PostingThe Daily Posting
Android

Sensitive login codes may be protected in Android 15

thedailyposting.comBy thedailyposting.comFebruary 19, 2024No Comments

[ad_1]

Keeping your online accounts safe is a constant battle, which makes using passkeys and two-factor authentication (2FA) essential. Two-factor authentication codes add an extra layer of security and prevent hackers from breaking into your account, but some of the methods currently used to send these codes aren’t the most secure. However, this may actually change in Android 15, as a new line found in the source code suggests.

One common form of 2FA is sending a one-time password (OTP) code via text or email. Although these methods are easy to use, they carry an inherent risk that the text or email containing the code may be intercepted by a malicious party. However, Android expert Mishaal Rahman (via Android Authority) recently took a closer look at the Android 14 QPR3 Beta 1 code, and found new security features aimed at protecting sensitive login codes. We see evidence of development in progress.

How does Google plan to protect login codes?

Google seems to be adding a new permission called “RECEIVE_SENSITIVE_NOTIFICATIONS”. This will likely be very limited and only available to certain system apps on your phone. This feature may work in conjunction with Android’s “NotificationListenerService” API, a system that allows apps to read and interact with notifications. This API is not automatically enabled and typically needs to be enabled manually in settings.

Sensitive login codes may be protected in Android 15Sensitive login codes may be protected in Android 15

Current notification access setting is on android 14 | Source: Android Authority

The code snippet also shows that android 15 There is a feature called “OTP_REDACTION” that allows the 2FA code to be hidden directly on the lock screen. Android’s NoticeListenerService is extremely powerful and can be a valuable tool for malicious apps to access sensitive data.

This new feature aims to prevent untrusted apps from reading notifications containing sensitive data such as OTP codes for logging into social media, banking, etc. Essentially, Android gives you more control over what information different apps can and cannot display. Taken together, these additions demonstrate that Google is working to significantly improve security. Based on these new findings, we conclude that the intended functionality is to hide these login codes from prying eyes, i.e., from prying apps, and to ensure that only trusted people can access them. There is a possibility.

[ad_2]

Source link

thedailyposting.com
  • Website

Related Posts

Qualcomm wants to make it easier for phone makers to issue Android updates

June 28, 2024

Qualcomm wants to make Android updates easier for OEMs

June 28, 2024

What’s new in the June 2024 Google system update for Android

June 28, 2024
Leave A Reply Cancel Reply

ads
© 2025 thedailyposting. Designed by thedailyposting.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms of Service
  • Advertise with Us
  • 1711155001.38
  • xtw183871351
  • 1711198661.96
  • xtw18387e4df
  • 1711246166.83
  • xtw1838741a9
  • 1711297158.04
  • xtw183870dc6
  • 1711365188.39
  • xtw183879911
  • 1711458621.62
  • xtw183874e29
  • 1711522190.64
  • xtw18387be76
  • 1711635077.58
  • xtw183874e27
  • 1711714028.74
  • xtw1838754ad
  • 1711793634.63
  • xtw183873b1e
  • 1711873287.71
  • xtw18387a946
  • 1711952126.28
  • xtw183873d99
  • 1712132776.67
  • xtw183875fe9
  • 1712201530.51
  • xtw1838743c5
  • 1712261945.28
  • xtw1838783be
  • 1712334324.07
  • xtw183873bb0
  • 1712401644.34
  • xtw183875eec
  • 1712468158.74
  • xtw18387760f
  • 1712534919.1
  • xtw183876b5c
  • 1712590059.33
  • xtw18387aa85
  • 1712647858.45
  • xtw18387da62
  • 1712898798.94
  • xtw1838737c0
  • 1712953686.67
  • xtw1838795b7
  • 1713008581.31
  • xtw18387ae6a
  • 1713063246.27
  • xtw183879b3c
  • 1713116334.31
  • xtw183872b3a
  • 1713169981.74
  • xtw18387bf0d
  • 1713224008.61
  • xtw183873807
  • 1713277771.7
  • xtw183872845
  • 1713329335.4
  • xtw183874890
  • 1716105960.56
  • xtw183870dd9
  • 1716140543.34
  • xtw18387691b

Type above and press Enter to search. Press Esc to cancel.