summaryrefslogtreecommitdiffstats
path: root/docs
diff options
context:
space:
mode:
authorDirk Dougherty <ddougherty@google.com>2010-06-02 16:53:00 -0700
committerDirk Dougherty <ddougherty@google.com>2010-06-02 16:53:00 -0700
commit5bacbfd39ba71089f9d599e5954aaa7cbee630a7 (patch)
treebe5d88834ff8c1142699a65315b5fd82705b38f2 /docs
parent6a297118724f31b1063b74f52295d459ec4f58dc (diff)
downloadframeworks_base-5bacbfd39ba71089f9d599e5954aaa7cbee630a7.zip
frameworks_base-5bacbfd39ba71089f9d599e5954aaa7cbee630a7.tar.gz
frameworks_base-5bacbfd39ba71089f9d599e5954aaa7cbee630a7.tar.bz2
Doc change: Adjust security sandbox description.
Change-Id: I7b2f530afe65fe0abe6c66e69c9abddcfbc5ae9c
Diffstat (limited to 'docs')
-rw-r--r--docs/html/guide/topics/security/security.jd17
1 files changed, 8 insertions, 9 deletions
diff --git a/docs/html/guide/topics/security/security.jd b/docs/html/guide/topics/security/security.jd
index da201c4..dbc9866 100644
--- a/docs/html/guide/topics/security/security.jd
+++ b/docs/html/guide/topics/security/security.jd
@@ -40,15 +40,14 @@ includes reading or writing the user's private data (such as contacts or
e-mails), reading or writing another application's files, performing
network access, keeping the device awake, etc.<p>
-<p>An application's process is a secure sandbox. It can't disrupt other
-applications, except by explicitly declaring the <em>permissions</em> it needs
-for additional capabilities not provided by the basic sandbox. These
-permissions it requests can be handled by the operating in various ways,
-typically by automatically allowing or disallowing based on certificates or
-by prompting the user. The permissions required by an application are declared
-statically in that application, so they can be known up-front at install time
-and will not change after that.</p>
-
+<p>An application's process runs in a security sandbox. The sandbox is designed
+to prevent applications from disrupting each other, except by explicitly
+declaring the <em>permissions</em> they need for additional capabilities not
+provided by the basic sandbox. The system handles requests for permissions
+in various ways, typically by automatically allowing or disallowing based on
+certificates or by prompting the user. The permissions required by an
+application are declared statically in that application, so they can be known
+up-front at install time and will not change after that.</p>
<a name="signing"></a>
<h2>Application Signing</h2>