• Business
  • Markets
  • Politics
  • Crypto
  • Finance
  • Intelligence
    • Policy Intelligence
    • Security Intelligence
    • Economic Intelligence
    • Fashion Intelligence
  • Energy
  • Technology
  • Taxes
  • Creator Economy
  • Wealth Management
  • LBNN Blueprints
  • Business
  • Markets
  • Politics
  • Crypto
  • Finance
  • Intelligence
    • Policy Intelligence
    • Security Intelligence
    • Economic Intelligence
    • Fashion Intelligence
  • Energy
  • Technology
  • Taxes
  • Creator Economy
  • Wealth Management
  • LBNN Blueprints

Google’s Advanced Protection for Vulnerable Users Comes to Android

Simon Osuji by Simon Osuji
May 13, 2025
in Artificial Intelligence
0
Google’s Advanced Protection for Vulnerable Users Comes to Android
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter


With the rise of mercenary spyware and other targeted threats, tech giants like Apple, Google, and Microsoft have spent the last few years trying to figure out how to protect the digital lives of their most at-risk, vulnerable users around the world. On mobile, the launch of Apple’s iOS Lockdown Mode in 2022 was one concerted effort to shed nonessential functionality in favor of maximum security—a trade-off most users wouldn’t want to make, but that could be very worth it for a public figure, activist, journalist, or dissident living under daily scrutiny and threat of attack. For years, Google has offered a program for a similar demographic called Advanced Protection that focuses on adding additional layers of monitoring and security to vulnerable users’ Google accounts, a core piece of many people’s digital lives that could be devastating if compromised. Now, Google is extending Advanced Protection with a suite of features for Android 16.

On Tuesday, the company announced an Advanced Protection mode for phones running the newest version of Android. At its core, the mode is designed around imposing strong security settings on all apps and services to silo data as much as possible and reduce interactions with unsecured web services and previously unknown, untrusted individuals. Advanced Protection on Android is meant to be as usable and flexible as possible, though, leaning on Google’s rapidly expanding on-device AI scanning capabilities to provide monitoring and alerts without having to completely eliminate features. Still, the mode imposes restrictions that can’t be turned off, like blocking phones from connecting to historic 2G data networks and disabling Chrome’s Javascript optimizer, which could alter or break some web functionality on some sites.

“There are two classes of things that we use to defend the user. One is you obviously harden the system, so you try to lock things down, you prevent many forms of attacks,” says Dave Kleidermacher, vice president of engineering at Android’s security and privacy division. “But two is you can’t always prevent every attack entirely. But if you can detect that you’ve been compromised, you can take some sort of corrective action. In consumer security on mobile this detection has never really been a possibility, so that’s one of the big things we’ve done here.”

This monitoring and detection capability, known as Intrusion Logging, uses end-to-end encryption to indelibly store logs from your device in the cloud such that they can’t be accessed by Google or any party aside from you, but also in a form that can’t be deleted or modified, even if your device and Google account are compromised.

Image may contain Electronics Mobile Phone and Phone

Courtesy of Google

Logging and system monitoring tools are common on laptops and desktops—not to mention in enterprise IT environments—but offering the capabilities for consumers on mobile devices is more unusual. As with any scheme that takes data off a device and puts it in the cloud, the system does introduce some new risks, but Google and Google Cloud Services already run many end-to-end encrypted platforms for users, and Kleidermacher notes that the ability to create indelible logs that can’t be manipulated or deleted by a sophisticated attacker is invaluable in addressing targeted attacks.

“The main innovation here is you have an audit log mechanism to detect compromise that is actually resistant to device tampering,” he says. “It’s bringing intrusion detection to the consumer. So if you as a consumer suspect a problem and you’re not sure, you can pull the logs down from the cloud. You can share them with a security expert, you can share them with an NGO, and they can use tools for analysis.”

Another feature that is on by default and can’t be turned off in Advanced Protection is Android’s Memory Tagging Extension (MTE). The feature, which debuted for Google’s Pixel line and is starting to be adopted in processors on other devices, is a hardware security protection related to how a system manages its memory. If an attacker attempts to exploit a memory vulnerability such as a so-called buffer overflow, MTE will cause the process to fail, stopping the attack in its tracks. Memory corruption bugs are a common tool used by hackers, so neutering the entire class of vulnerabilities makes it much more difficult to attack a device.



Source link

Related posts

Inside the Rolling Layoffs at Jack Dorsey’s Block

Inside the Rolling Layoffs at Jack Dorsey’s Block

February 20, 2026
‘Pew Pew’: The Chinese Companies Marketing Anti-Drone Weapons on TikTok

‘Pew Pew’: The Chinese Companies Marketing Anti-Drone Weapons on TikTok

February 20, 2026
Previous Post

Worry as Dangote Refinery, oil marketers in face-off over pricing, market control – EnviroNews

Next Post

South Korea Upgrades Anti-Ship Missile Decoy System

Next Post
South Korea Upgrades Anti-Ship Missile Decoy System

South Korea Upgrades Anti-Ship Missile Decoy System

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

RECOMMENDED NEWS

Trump to Name DRC Envoy as Kinshasa Seeks Mineral Deal

Trump to Name DRC Envoy as Kinshasa Seeks Mineral Deal

12 months ago
Nord Security founders launch Nexos.ai to help enterprises take AI projects from pilot to production

Nord Security founders launch Nexos.ai to help enterprises take AI projects from pilot to production

1 year ago
Senegal Election Delay Sparks Protest Bans, Internet Shutdowns

Senegal Election Delay Sparks Protest Bans, Internet Shutdowns

2 years ago
Morocco launches longest desalinated water pipeline to power world’s largest phosphate mine

Morocco launches longest desalinated water pipeline to power world’s largest phosphate mine

7 months ago

POPULAR NEWS

  • Ghana to build three oil refineries, five petrochemical plants in energy sector overhaul

    Ghana to build three oil refineries, five petrochemical plants in energy sector overhaul

    0 shares
    Share 0 Tweet 0
  • The world’s top 10 most valuable car brands in 2025

    0 shares
    Share 0 Tweet 0
  • Top 10 African countries with the highest GDP per capita in 2025

    0 shares
    Share 0 Tweet 0
  • Global ranking of Top 5 smartphone brands in Q3, 2024

    0 shares
    Share 0 Tweet 0
  • When Will SHIB Reach $1? Here’s What ChatGPT Says

    0 shares
    Share 0 Tweet 0

Get strategic intelligence you won’t find anywhere else. Subscribe to the Limitless Beliefs Newsletter for monthly insights on overlooked business opportunities across Africa.

Subscription Form

© 2026 LBNN – All rights reserved.

Privacy Policy | About Us | Contact

Tiktok Youtube Telegram Instagram Linkedin X-twitter
No Result
View All Result
  • Home
  • Business
  • Politics
  • Markets
  • Crypto
  • Economics
    • Manufacturing
    • Real Estate
    • Infrastructure
  • Finance
  • Energy
  • Creator Economy
  • Wealth Management
  • Taxes
  • Telecoms
  • Military & Defense
  • Careers
  • Technology
  • Artificial Intelligence
  • Investigative journalism
  • Art & Culture
  • LBNN Blueprints
  • Quizzes
    • Enneagram quiz
  • Fashion Intelligence

© 2023 LBNN - All rights reserved.