二進位檔透明化
透過集合功能整理內容
你可以依據偏好儲存及分類內容。
Android 二進位檔透明度功能可讓使用者信任並更加信賴在裝置上執行的二進位檔 (例如應用程式、作業系統、韌體)。只要使用者能夠追蹤在裝置上執行的特定二進位檔 (包括韌體本身) 至原始來源 (如有),並驗證二進位檔未經修改或竄改 (即使是可能存取二進位檔簽署金鑰的敵對方),就能達成這項目標。
總覽
軟體供應鏈日益容易遭受攻擊,從遭到入侵的簽署金鑰,到隱密的程式碼注入,再到內部攻擊。
為了提升使用者對我們所使用軟體的信心和信任,我們可以利用下列屬性建立透明度記錄:
- 僅限附加:系統無法偵測到記錄內容的刪除、修改或回溯插入
- 透過密碼編譯技術確保安全性:利用 Merkle 樹狀圖資料結構,確保只可附加的屬性
- 可公開稽核:任何人都可以查詢記錄內容
將軟體中繼資料做為記錄內容發布,可提供可驗證的來源記錄,提高我們信任及執行的二進位檔的信心。
專案
目前,我們已推出兩種記錄:
除非另有註明,否則本頁面中的內容是採用創用 CC 姓名標示 4.0 授權,程式碼範例則為阿帕契 2.0 授權。詳情請參閱《Google Developers 網站政策》。Java 是 Oracle 和/或其關聯企業的註冊商標。
上次更新時間:2024-11-11 (世界標準時間)。
[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["缺少我需要的資訊","missingTheInformationINeed","thumb-down"],["過於複雜/步驟過多","tooComplicatedTooManySteps","thumb-down"],["過時","outOfDate","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["示例/程式碼問題","samplesCodeIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2024-11-11 (世界標準時間)。"],[[["Android Binary Transparency aims to enhance trust in the binaries running on Android devices by enabling users to verify their origins and integrity."],["This is achieved by creating a transparent, append-only log of software metadata, cryptographically secured and publicly auditable."],["Users can trace a binary back to its source and confirm its authenticity, safeguarding against potential modifications or tampering, even with compromised signing keys."],["Increased transparency combats vulnerabilities in software supply chains stemming from compromised keys, code injections, and insider threats."]]],["Android Binary Transparency aims to enhance user trust in device binaries by enabling verification of their origin and integrity. This is achieved through a transparency log with append-only, cryptographically assured, and publicly auditable properties. The log stores software metadata, allowing users to trace binaries back to their source and confirm they are unmodified. This addresses vulnerabilities in software supply chains, such as compromised keys or code injection. Two transparency logs have been launched: Pixel Firmware Transparency and Google System APK Transparency.\n"]]