Centre-align Heading 1. Increase body text size. Improve code formatting. Add Google Pixel 6 sources. Improve text.
This commit is contained in:
commit
9537e5173c
37
about.html
37
about.html
@ -71,36 +71,49 @@
|
|||||||
<br>
|
<br>
|
||||||
They also include a
|
They also include a
|
||||||
<a class="table-link" href="https://developer.android.com/training/articles/keystore#HardwareSecurityModule">hardware security module</a>
|
<a class="table-link" href="https://developer.android.com/training/articles/keystore#HardwareSecurityModule">hardware security module</a>
|
||||||
(Titan M2, improving on the first generation
|
(Titan M2, improving on the previous generation
|
||||||
<a class="table-link" href="https://security.googleblog.com/2018/10/building-titan-better-security-through.html">Titan M</a>)
|
<a class="table-link" href="https://security.googleblog.com/2018/10/building-titan-better-security-through.html">Titan M</a>)
|
||||||
which is extremely resistant to both remote and physical attacks due to being
|
which is extremely resistant to both remote and physical attacks due to being
|
||||||
completely isolated from the rest of the system, including the operating system.
|
completely isolated from the rest of the system, including the operating system.
|
||||||
Titan M2 ensures that the device cannot be remotely compromised by requiring the
|
Titan M2 ensures that the device cannot be remotely compromised by requiring the
|
||||||
side buttons of the device to be physically pressed for some sensitive operations.
|
side buttons of the device to be physically pressed for some sensitive operations.
|
||||||
Titan M2 also takes the role of
|
Titan M2 also takes the role of
|
||||||
<a class="table-link" href="https://source.android.com/docs/security/best-practices/hardware#strongbox-keymaster">Android Strongbox Keymaster</a>,
|
<a class="table-link" href="https://source.android.com/docs/security/best-practices/hardware#strongbox-keymaster">Android StrongBox Keymaster</a>,
|
||||||
a <a class="table-link" href="https://source.android.com/docs/security/features/keystore">hardware-backed Keystore</a>
|
a <a class="table-link" href="https://source.android.com/docs/security/features/keystore">hardware-backed Keystore</a>
|
||||||
containing sensitive user keys which are unavailable to
|
containing sensitive user keys which are unavailable to
|
||||||
the OS or apps running on it without authorisation from Titan M2 itself. Insider attack
|
the OS or apps running on it without authorisation from Titan M2 itself.
|
||||||
resistance ensures that Titan M2 firmware can be flashed only if the user PIN/password
|
<a class="table-link" href="https://android-developers.googleblog.com/2018/05/insider-attack-resistance.html">Insider attack
|
||||||
|
resistance</a> ensures that Titan M2 firmware can be flashed only if the user PIN/password
|
||||||
is already known, making it impossible to backdoor the device without already knowing
|
is already known, making it impossible to backdoor the device without already knowing
|
||||||
these secrets.<br>
|
these secrets.<br>
|
||||||
<br>
|
<br>
|
||||||
Google Pixel device kernels are compiled with fine-grained, forward-edge control-flow
|
Google Pixel device kernels are compiled with
|
||||||
integrity and backward-edge control-flow integrity to prevent code reuse attacks against
|
<a class="table-link" href="https://android-developers.googleblog.com/2018/10/control-flow-integrity-in-android-kernel.html"
|
||||||
the kernel. MAC address randomisation is implemented well, with minimal probe requests
|
>forward-edge control-flow integrity</a> and
|
||||||
and randomised initial sequence numbers.<br>
|
<a class="table-link" href="https://security.googleblog.com/2019/10/protecting-against-code-reuse-in-linux_30.html"
|
||||||
|
>backward-edge control-flow integrity</a> to prevent code reuse attacks against
|
||||||
|
the kernel. MAC address randomisation is
|
||||||
|
<a class="table-link" href="https://android-developers.googleblog.com/2017/04/changes-to-device-identifiers-in.html"
|
||||||
|
>implemented well, along with minimal probe requests and randomised initial sequence numbers</a>.<br>
|
||||||
<br>
|
<br>
|
||||||
Google releases guaranteed monthly security updates, ensuring Google Pixel devices are
|
Google releases
|
||||||
|
<a class="table-link" href="https://source.android.com/docs/security/bulletin/pixel/"
|
||||||
|
>guaranteed monthly security updates</a>, ensuring Google Pixel devices are
|
||||||
up-to-date and quickly protected against security vulnerabilities.<br>
|
up-to-date and quickly protected against security vulnerabilities.<br>
|
||||||
<br>
|
<br>
|
||||||
Pixel 6-series devices are a large improvement over the already very secure and private
|
Pixel 6-series devices are a large improvement over the already very secure and private
|
||||||
previous generation Pixel devices. They replace ARM-based Titan M with RISC-V-based Titan M2,
|
previous generation Pixel devices. They replace ARM-based Titan M with RISC-V-based Titan M2,
|
||||||
reducing trust by removing ARM from the equation. Titan M2 is more resiliant to attacks than
|
reducing trust by removing ARM from the equation. Titan M2 is more resiliant to attacks than
|
||||||
Titan M, and is AVA_VAN.5 certified, the highest level of vulnerability assessment. Google's
|
Titan M, and is
|
||||||
|
<a class="table-link" href="https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/09/nscib-cc-22-0228971-cert-final.pdf"
|
||||||
|
>AVA_VAN.5 certified</a>, the highest level of vulnerability assessment. Google's
|
||||||
in-house Tensor SoC includes Tensor Security Core, further improving device security.<br>
|
in-house Tensor SoC includes Tensor Security Core, further improving device security.<br>
|
||||||
Pixel 6-series devices are supported for a minimum of 5 years from launch, an increase from
|
Pixel 6-series devices are supported for a
|
||||||
previous generations' support lifecycles of 3 years.</td>
|
<a class="table-link" href="https://support.google.com/nexus/answer/4457705#zippy=%2Cpixel-and-later"
|
||||||
|
>minimum of 5 years from launch</a>, an increase from
|
||||||
|
previous generations'
|
||||||
|
<a class="table-link" href="https://support.google.com/nexus/answer/4457705#zippy=%2Cpixel-xl-a-a-g-and-a-g"
|
||||||
|
>support lifecycles of 3 years</a>.</td>
|
||||||
</tr>
|
</tr>
|
||||||
</table>
|
</table>
|
||||||
<br>
|
<br>
|
||||||
|
@ -20,11 +20,9 @@
|
|||||||
<br>
|
<br>
|
||||||
<p>Updated: 2022-06-23 (UTC+00:00)</p>
|
<p>Updated: 2022-06-23 (UTC+00:00)</p>
|
||||||
<br>
|
<br>
|
||||||
<pre>
|
<code>
|
||||||
<code>
|
+447549902964
|
||||||
+447549902964
|
</code>
|
||||||
</code>
|
|
||||||
</pre>
|
|
||||||
<br>
|
<br>
|
||||||
<br>
|
<br>
|
||||||
</body>
|
</body>
|
||||||
|
@ -45,13 +45,14 @@ body {
|
|||||||
margin-left: 400px;
|
margin-left: 400px;
|
||||||
margin-right: 150px;
|
margin-right: 150px;
|
||||||
font-family: Roboto, sans-serif;
|
font-family: Roboto, sans-serif;
|
||||||
font-size: 18px;
|
font-size: 20px;
|
||||||
background-color: #262626;
|
background-color: #262626;
|
||||||
}
|
}
|
||||||
|
|
||||||
h1 {
|
h1 {
|
||||||
font-family: Roboto, sans-serif;
|
font-family: Roboto, sans-serif;
|
||||||
font-size: 26px;
|
font-size: 26px;
|
||||||
|
text-align: center;
|
||||||
color: #ffffff;
|
color: #ffffff;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -86,7 +87,7 @@ p {
|
|||||||
}
|
}
|
||||||
|
|
||||||
code {
|
code {
|
||||||
font-size: 14px;
|
font-size: 18px;
|
||||||
color: #ffffff;
|
color: #ffffff;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user