Prior to this, I've been using 2fa on the google account that is attached to the phone - I even just switched to a physical key as an additional precaution. My antivirus software found malware on one of my phone apps about 2 days ago, and I deleted that app then a rescan showed no malware , but that doesn't explain how the suspicious behavior that happened today is possible.
A note on this app - there don't seem to be any Play Store reviews that complain about malware except for 1 that said that it was downloading updates to itself without permission. How could these PDFs have been downloaded without my permission, and what further measures can I take to protect myself?
Sign up to join this community. The best answers are voted up and rise to the top. Stack Overflow for Teams — Collaborate and share knowledge with a private group.
Create a free Team What is Teams? Learn more. Android 10 downloaded suspicious files without my permission Ask Question. Asked 1 year, 7 months ago. Active 1 year, 7 months ago. Viewed times. This is my first question on this forum so please let me know if I need to clarify anything. But we can leverage Storage Access Framework, other apps gallery, file explorer, etc to let user a pick a file that they want to use.
Reading from internal storage or cache directory does not require any system permissions. This intent will trigger an application or an app chooser using which user can pick a file.
This will return your app an uri generated from FileProvider and your app gets temporary access to read the file. So yes, if you have an app which seldom reads from external storage, you may use this method to read files without requiring explicit permissions. Read more about Document Provider. Sharing some information from the app has become one of the most basic requirements and users want to share a lot of things with their friends, eg.
To improve security and also to make sure that other apps with which the content is being shared with has the correct permissions, Android introduced FileProvider. Above we used other apps to create and read files from external storage. This is only possible because of FileProvider. I think FileProvider is the single most useful feature in android ecosystem. Or you can just set it based on your app id. Keep android:exported attribute as false as the FileProvider does not need to be public.
Set the android:grantUriPermissions attribute to true, to allow you to grant temporary access to files. In the meta-data you have to define what files are available through fileprovider for other apps to use. This does not mean that other apps have access to those files. Other apps will have access only when your app generates a content uri using FileProvider, shares it with the other apps via intent and grants uri permissions.
For instance, when you tap on an APK from your file manager or a download notification from Chrome. You quickly realize it was a bad decision, but how do you go back and revoke the permission? Luckily for you, there is a dedicated Settings page where you can manage this permission for apps that have asked for it one time or another. For more info, Please read our privacy policy before submitting your comment. Save my name, email, and website in this browser for the next time I comment.
This site uses Akismet to reduce spam. Learn how your comment data is processed. Skip to primary navigation Skip to main content Skip to primary sidebar.
0コメント