Update documentation to account for Safety Center UI
This commit is contained in:
parent
fca5cdf296
commit
7b6b2b5bbd
@ -645,8 +645,8 @@
|
|||||||
<p>As of Android 12, the user is notified when an app reads clipboard content
|
<p>As of Android 12, the user is notified when an app reads clipboard content
|
||||||
which was set by a different app. This notice is enabled by default and can be
|
which was set by a different app. This notice is enabled by default and can be
|
||||||
toggled under <b>Settings <span aria-label="and then">></span>
|
toggled under <b>Settings <span aria-label="and then">></span>
|
||||||
Privacy <span aria-label="and then">></span> Show clipboard
|
Security & privacy <span aria-label="and then">></span> Privacy <span
|
||||||
access</b>.</p>
|
aria-label="and then">></span> Show clipboard access</b>.</p>
|
||||||
</article>
|
</article>
|
||||||
|
|
||||||
<article id="hardware-identifiers">
|
<article id="hardware-identifiers">
|
||||||
@ -1138,9 +1138,10 @@
|
|||||||
as part of Widevine provisioning. This is another form of key provisioning for
|
as part of Widevine provisioning. This is another form of key provisioning for
|
||||||
per-app keys that are used when playing DRM protected media. DRM support is
|
per-app keys that are used when playing DRM protected media. DRM support is
|
||||||
enabled in the OS by default but we don't include any apps using it by default,
|
enabled in the OS by default but we don't include any apps using it by default,
|
||||||
since it's disabled in Vanadium. A setting is added at Settings ➔ Network &
|
since it's disabled in Vanadium. A setting is added at <b>Settings <span
|
||||||
Internet ➔ Widevine provisioning for switching to directly using the Google
|
aria-label="and then">></span> Network & Internet#160;<span aria-label="and then">></span>
|
||||||
service if you prefer.</p>
|
Widevine provisioning</b> for switching to directly using the Google service if
|
||||||
|
you prefer.</p>
|
||||||
|
|
||||||
<p>Most other connections made by the OS itself are made based on your chosen
|
<p>Most other connections made by the OS itself are made based on your chosen
|
||||||
carrier. The OS has a database of APN and other carrier configuration settings
|
carrier. The OS has a database of APN and other carrier configuration settings
|
||||||
|
@ -602,7 +602,8 @@
|
|||||||
data due to being denied, GrapheneOS creates a notification that can be
|
data due to being denied, GrapheneOS creates a notification that can be
|
||||||
easily disabled. The Sensors permission can be set to be disabled by default
|
easily disabled. The Sensors permission can be set to be disabled by default
|
||||||
for user installed apps in <b>Settings <span aria-label="and
|
for user installed apps in <b>Settings <span aria-label="and
|
||||||
then">></span> Privacy</b>.</p>
|
then">></span> Security & privacy <span aria-label="and
|
||||||
|
then">></span> More security & privacy</b>.</p>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section id="storage-scopes">
|
<section id="storage-scopes">
|
||||||
@ -699,7 +700,8 @@
|
|||||||
name of the screenshot which is fully visible to the user and can be easily
|
name of the screenshot which is fully visible to the user and can be easily
|
||||||
modified by them without a third-party tool. GrapheneOS includes a toggle for
|
modified by them without a third-party tool. GrapheneOS includes a toggle for
|
||||||
turning this metadata back on in <b>Settings <span aria-label="and
|
turning this metadata back on in <b>Settings <span aria-label="and
|
||||||
then">></span> Privacy</b> since some users may find it to be useful.</p>
|
then">></span> Security & privacy <span aria-label="and
|
||||||
|
then">></span> More security & privacy</b> since some users may find it to be useful.</p>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section id="closed-device-identifier-leaks">
|
<section id="closed-device-identifier-leaks">
|
||||||
@ -828,7 +830,8 @@
|
|||||||
with any such prompt in the OS).</p>
|
with any such prompt in the OS).</p>
|
||||||
|
|
||||||
<p>The wipe does not require a reboot and cannot be interrupted. It can be set
|
<p>The wipe does not require a reboot and cannot be interrupted. It can be set
|
||||||
up at <b>Settings <span aria-label="and then">></span> Security  <span
|
up at <b>Settings <span aria-label="and then">></span>Security & privacy <span
|
||||||
|
aria-label="and then">></span> Device unlock <span
|
||||||
aria-label="and then">></span> Duress Password</b> in the owner profile. Both a
|
aria-label="and then">></span> Duress Password</b> in the owner profile. Both a
|
||||||
duress PIN and password will need to be set to account for different profiles
|
duress PIN and password will need to be set to account for different profiles
|
||||||
that may have different unlock methods.</p>
|
that may have different unlock methods.</p>
|
||||||
|
@ -376,7 +376,8 @@
|
|||||||
|
|
||||||
<p>GrapheneOS disables showing the characters as passwords are typed by default. You
|
<p>GrapheneOS disables showing the characters as passwords are typed by default. You
|
||||||
can enable this in <b>Settings <span aria-label="and then">></span>
|
can enable this in <b>Settings <span aria-label="and then">></span>
|
||||||
Privacy</b>.</p>
|
Security & privacy <span aria-label="and then">></span> Privacy <span
|
||||||
|
aria-label="and then">></span> Show passwords</b>.</p>
|
||||||
|
|
||||||
<p>Third party accessibility services can be installed and activated. This
|
<p>Third party accessibility services can be installed and activated. This
|
||||||
includes the ones made by Google. Most of these will work but some may have a hard
|
includes the ones made by Google. Most of these will work but some may have a hard
|
||||||
@ -813,8 +814,9 @@
|
|||||||
for each boot via the shared randomized values.</p>
|
for each boot via the shared randomized values.</p>
|
||||||
|
|
||||||
<p>This feature can be disabled via <b>Settings <span aria-label="and
|
<p>This feature can be disabled via <b>Settings <span aria-label="and
|
||||||
then">></span> Security <span aria-label="and then">></span> Secure app
|
then">></span> Security & privacy <span aria-label="and then">></span>
|
||||||
spawning</b> if you prefer to have faster cold start app spawning time and lower
|
Exploit protection <span aria-label="and then">></span> Secure app spawning</b>
|
||||||
|
if you prefer to have faster cold start app spawning time and lower
|
||||||
app process memory usage instead of the substantial security benefits and the
|
app process memory usage instead of the substantial security benefits and the
|
||||||
removal of the only known remaining direct device identifiers across profiles (i.e.
|
removal of the only known remaining direct device identifiers across profiles (i.e.
|
||||||
not depending on fingerprinting global configuration, available storage space, etc.
|
not depending on fingerprinting global configuration, available storage space, etc.
|
||||||
@ -1250,7 +1252,8 @@
|
|||||||
prevent inspecting or modifying the app in a weak attempt to hide their code and API
|
prevent inspecting or modifying the app in a weak attempt to hide their code and API
|
||||||
from security researchers. GrapheneOS allows users to disable <b>Native code
|
from security researchers. GrapheneOS allows users to disable <b>Native code
|
||||||
debugging</b> via a toggle in <b>Settings <span aria-label="and then">></span>
|
debugging</b> via a toggle in <b>Settings <span aria-label="and then">></span>
|
||||||
Security</b> to improve the app sandbox and this can interfere with apps debugging their
|
Security & privacy <span aria-label="and then">></span> Exploit protection</b>
|
||||||
|
to improve the app sandbox and this can interfere with apps debugging their
|
||||||
own code to add a barrier to analyzing the app. You should try enabling this again if you've
|
own code to add a barrier to analyzing the app. You should try enabling this again if you've
|
||||||
disabled it and are encountering compatibility issues with these kinds of apps.</p>
|
disabled it and are encountering compatibility issues with these kinds of apps.</p>
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user