Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Logitech’s Pro X2 Superstrike offers haptic-based clicks and rapid trigger

    September 17, 2025

    You can soon attend Zoom meetings as your AI avatar

    September 17, 2025

    Tariffs kill the Starling Home Hub, Google Nest’s best bridge to Apple Home

    September 17, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Google’s Advanced Protection for Vulnerable Users Comes to Android
    Security

    Google’s Advanced Protection for Vulnerable Users Comes to Android

    News RoomBy News RoomMay 14, 20254 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    With the rise of mercenary spyware and other targeted threats, tech giants like Apple, Google, and Microsoft have spent the last few years trying to figure out how to protect the digital lives of their most at-risk, vulnerable users around the world. On mobile, the launch of Apple’s iOS Lockdown Mode in 2022 was one concerted effort to shed nonessential functionality in favor of maximum security—a trade-off most users wouldn’t want to make, but that could be very worth it for a public figure, activist, journalist, or dissident living under daily scrutiny and threat of attack. For years, Google has offered a program for a similar demographic called Advanced Protection that focuses on adding additional layers of monitoring and security to vulnerable users’ Google accounts, a core piece of many people’s digital lives that could be devastating if compromised. Now, Google is extending Advanced Protection with a suite of features for Android 16.

    On Tuesday, the company announced an Advanced Protection mode for phones running the newest version of Android. At its core, the mode is designed around imposing strong security settings on all apps and services to silo data as much as possible and reduce interactions with unsecured web services and previously unknown, untrusted individuals. Advanced Protection on Android is meant to be as usable and flexible as possible, though, leaning on Google’s rapidly expanding on-device AI scanning capabilities to provide monitoring and alerts without having to completely eliminate features. Still, the mode imposes restrictions that can’t be turned off, like blocking phones from connecting to historic 2G data networks and disabling Chrome’s Javascript optimizer, which could alter or break some web functionality on some sites.

    “There are two classes of things that we use to defend the user. One is you obviously harden the system, so you try to lock things down, you prevent many forms of attacks,” says Dave Kleidermacher, vice president of engineering at Android’s security and privacy division. “But two is you can’t always prevent every attack entirely. But if you can detect that you’ve been compromised, you can take some sort of corrective action. In consumer security on mobile this detection has never really been a possibility, so that’s one of the big things we’ve done here.”

    This monitoring and detection capability, known as Intrusion Logging, uses end-to-end encryption to indelibly store logs from your device in the cloud such that they can’t be accessed by Google or any party aside from you, but also in a form that can’t be deleted or modified, even if your device and Google account are compromised.

    Courtesy of Google

    Logging and system monitoring tools are common on laptops and desktops—not to mention in enterprise IT environments—but offering the capabilities for consumers on mobile devices is more unusual. As with any scheme that takes data off a device and puts it in the cloud, the system does introduce some new risks, but Google and Google Cloud Services already run many end-to-end encrypted platforms for users, and Kleidermacher notes that the ability to create indelible logs that can’t be manipulated or deleted by a sophisticated attacker is invaluable in addressing targeted attacks.

    “The main innovation here is you have an audit log mechanism to detect compromise that is actually resistant to device tampering,” he says. “It’s bringing intrusion detection to the consumer. So if you as a consumer suspect a problem and you’re not sure, you can pull the logs down from the cloud. You can share them with a security expert, you can share them with an NGO, and they can use tools for analysis.”

    Another feature that is on by default and can’t be turned off in Advanced Protection is Android’s Memory Tagging Extension (MTE). The feature, which debuted for Google’s Pixel line and is starting to be adopted in processors on other devices, is a hardware security protection related to how a system manages its memory. If an attacker attempts to exploit a memory vulnerability such as a so-called buffer overflow, MTE will cause the process to fail, stopping the attack in its tracks. Memory corruption bugs are a common tool used by hackers, so neutering the entire class of vulnerabilities makes it much more difficult to attack a device.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleMicrosoft starts testing  ‘Hey, Copilot!’ in Windows
    Next Article Grok really wanted people to know that claims of white genocide in South Africa are highly contentious

    Related Posts

    Here’s What to Know About Poland Shooting Down Russian Drones

    September 16, 2025

    Jeffrey Epstein’s Yahoo Inbox Revealed

    September 16, 2025

    Charlie Kirk Shooting Suspect Identified as 22-Year-Old Utah Man

    September 16, 2025

    A New Platform Offers Privacy Tools to Millions of Public Servants

    September 15, 2025

    Apple’s Big Bet to Eliminate the iPhone’s Most Targeted Vulnerabilities

    September 13, 2025

    Defense Department Scrambles to Pretend It’s Called the War Department

    September 12, 2025
    Our Picks

    You can soon attend Zoom meetings as your AI avatar

    September 17, 2025

    Tariffs kill the Starling Home Hub, Google Nest’s best bridge to Apple Home

    September 17, 2025

    Kuxiu’s X40 Turbo lays claim to best 3-in-1 travel charger

    September 17, 2025

    The Analogue 3D isn’t out yet, but its N64-inspired controller is 31 percent off

    September 17, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Business

    Matthew Prince Wants AI Companies to Pay for Their Sins

    By News RoomSeptember 17, 2025

    My evidence that we’re onto something is we’ve seen a handful of content deals, and…

    Apple’s iPhone 17 Pro is a bold redesign but a basic upgrade

    September 17, 2025

    Casio’s stress-relieving furry robot is coming to the US

    September 17, 2025

    The iPhone 17 is the one to get this year

    September 17, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.