Sailfish os 2.0 installed. What is Sailfish OS and what is it needed for? What do we have with the stitches behind the koristuvach and with the turns

We often write about the security of mobile operating systems, publish information about the discovery of leaks, and describe the weaknesses of protection and the methods of evil. We wrote about the restrictions on Android users, and about the useless programs that are installed directly into the firmware, and about the lack of control over the flow of data from the user in the darkness of the printer. Which of today's mobile platforms is the most secure for a retailer - which one would you like to be the least secure? Let's try to get back together.

What's so safe?

You can’t talk about the safety of the building without saying that we, in good faith, are respectful. Do I need to take care of your physical needs? Protection from low-level analysis methods from acquired memory chips, or simply protection from problems such as not knowing the password and not fooling the fingerprint scanner? Transferring data to the hmaru - plus or minus from the point of view of security? And in this gloom, who and where, what kind of data, who knows about this koristuvach and who can drink it? How is it possible to get a Trojan on this or any other platform and lose not only your passwords, but also your money?

The security aspects of mobile platforms cannot be seen from a single perspective. Security is a complex solution that protects all devices between communications and isolation of data to low-level security and data encryption.

Today we will briefly describe the main advantages and problems of all current mobile operating systems that may be expanded. The list includes Google Android, Apple iOS and Windows 10 Mobile (unfortunately, Windows Phone 8.1 can no longer be called modern). BlackBerry 10, Sailfish and Samsung Tizen are a bonus.

Grandfather: BlackBerry 10

Let us first begin with a description of the current platforms, let’s say a few words about BlackBerry 10, which have already gone beyond the distance. Why BlackBerry 10? At some point, the system was actively promoted as the “most secure” mobile OS. It was true that, as in the past, it was overdone, that it was relevant three years ago, but is hopelessly outdated today. We liked the BlackBerry company's approach to security; However, there were some failures.

  • Micronuclear architecture and system of trusted acquisition are truly safe. The rights of the super-creditor for the entire hour of the system’s operation were not revoked by anyone (among other things, they were applied for more than once, including in serious offices - BlackBerry has not always been an outsider).
  • It is also impossible to bypass the password for unlocking the device: after ten recent attempts, the data on the device will no longer be available.
  • There are no intrusive crappy services and there is no direct commitment from the customer. The data is not transferred to the bank because users do not want to install the dirty program on their own (services such as OneDrive, Box.com, Dropbox are optionally supported).
  • Seamless implementation of corporate security and remote control policies through BES (BlackBerry Enterprise Services).
  • Reliable (or optional) encryption of both stored storage and memory cards.
  • There are no backup copies at all, and local ones are encrypted using an additional secure key linked to the BlackBerry ID.
  • The data is not encrypted. Prote company can activate encryption on the devices of smartphones.
  • Encryption of data on a block, peer-to-peer; Everyday understanding of the classes of protection and whatever, I would like to remember Keychain in iOS. For example, data can be retrieved from a backup copy using Wallet programs.
  • You can log in to your BlackBerry ID account simply with your login and password; Two-factor authentication is not supported. Today, such an approach is absolutely unpleasant. Before you know the password for your BlackBerry ID, you can retrieve the key that will help you decrypt the files associated with this backup.
  • The protection against reset to factory settings and the protection against theft is even weaker. You can get by by simply replacing the BlackBerry Protect programs with the installation of an auto-recorder or (up to BB 10.3.3) a lower version of the firmware.
  • Daily randomization of the MAC address, which allows you to connect a specific device to an additional Wi-Fi access point.

Another tip: BlackBerry is willing to cooperate with law enforcement agencies, providing maximum possible assistance in catching criminals who prosecute BlackBerry smartphones.

In general, with proper setup (and users who have chosen BlackBerry 10 usually set up their devices quite competently), the system can provide both a pleasant level of security and a high level of privacy. At the same time, “acknowledged koristuvachs” can learn all the achievements again by installing a malicious version of Google Play Services on their smartphone and removing all the accessory from the “Great Brother” view.

Exotica: Tizen and Sailfish

Tizen and Sailfish are clearly outsiders to the market. The outsiders are by and large, including Windows 10 Mobile and BlackBerry 10, some of which fell below the 0.1% mark. There is no safety - there is no safety for the “elusive Joe”; Little is known about it except for the fact that few people care about the stench.

The extent to which this approach is justified can be judged from the recently published investigation, which revealed nearly forty critical problems with Tizen. Here you can see something that has been known for a long time.

  • If no serious independent investigations were carried out, then we cannot talk about the safety of the platform. Critical spills will not open until the lower platform will be widened. It will be too late.
  • There is no shortage of poor performance due to the weak width of the platform. Tezhist until the singing world.
  • Security mechanisms are insufficient, daily or described only on paper.
  • Whether there are any certifications, let’s talk only about those devices that have passed certification, but say nothing at all about the actual level of security.

Jolla Sailfish

The situation with Sailfish is ambiguous. On the one hand, the system is still alive: every hour they announce what will be arranged, and the news “Post of Russia” has added a large batch of devices with an extremely high price tag. On the other hand, buyers are tempted to pay the price of a mid-range Android phone for a model run by Sailfish, which has the characteristics of a Chinese cheap smartphone of three (!) years ago. This approach has the same effect: since models on Sailfish will be purchased for budgetary pennies, after which the sleepy government services of the lower lands. It’s clear that there is no concern for such an approach to please the participants at all.

And the availability of government certificates does not provide any guarantee, just as it does not provide a clear output code. For example, the Heartbeat malware was detected in the firmware of routers, the output code for which has private access for more than ten years. In the Android operating system, which also contains open source code, new releases appear regularly.

Exotic OS means a lack of infrastructure, a limited set of devices and add-ons, poor management of corporate security policies, and even less dubious security.





Samsung Tizen

In addition to other “exotic” platforms, Samsung uses Tizen. Under the umbrella of Ubuntu Touch and Sailfish, Tizen, the system has been completely expanded. They operate under dozens of models of smart Samsung TVs, as well as smart phones and a number of budget smartphones (Samsung Z1–Z4).

As Tizen saw significant expansion, independent successors took over the system. The result is unexpected: in the first month, over forty critical leaks were found. Amichai Neiderman is quoted as a testament to Tizen security monitoring:

Possibly, this is the largest code that I have ever had the chance to download. All the favors that could have been allowed were allowed. Obviously, having written and verified the code, no one understands anything. It’s all the same as asking a student to write you a security program.

The idea of ​​​​senseless ideas: to vikorize the exotic, low-broad system of the corporate middle - open the request for hackers.


Apple iOS

Apple is highly praised. So, without the closed ecosystem, and thus, the price tag is not equal to technical capabilities, devices running iOS will be deprived of the most secure solutions from expanding commercial solutions. The price is mainly for production models of the iPhone 6s and 7 generations (and, perhaps, SE).

Older devices have a smaller supply of value. For older iPhones 5c, 5s and 6, there are already methods for unlocking the lock and attacking the device password (for details, you can contact the distributor - Cellebrite). But for these old devices, breaking the vanguard is labor-intensive and not cheap (from Cellebrite they ask thousands of dollars for the service). I don’t think anyone can tamper with my phone or yours this way.

Well, what do we expect for today? Mostly from physical safety.

  1. All iPhones and iPads running iOS 8.0 and higher (and iOS 10.3.2 is currently up to date, which is even more secure) are subject to the same secure methods that will guide them to their source, both officially and in fact. information from blocked devices. Independent investigations (including those from the ElcomSoft laboratory) confirm Apple's claims.
  2. In iOS, a system has been introduced (and is working effectively) to protect data from theft or loss of the device. Available mechanisms for remotely erasing data and blocking the device. The stolen devices cannot be unlocked or resold, since the attacker is unaware of both the password on the device and the other password for the owner’s Apple ID account. (However, for Chinese craftsmen, this is all, and putting the device into the hardware part can bypass this protection... for the iPhone 5s and more older devices.)
  3. Bagatory's new data encryption “out of the box” is perfectly designed and implemented. The data section is encrypted at all times; A block cipher with keys that are unique to each adjacent block is created, in which case the private keys are deleted when the file is deleted, which means that it is basically impossible to renew the deleted data. The keys are stolen by the visible processor, so you can enter before the Secure Enclave system, and you can’t extract them from jailbreak (we tried). When turned on, your data will not be encrypted unless you enter the correct password. Moreover, your data (for example, passwords for websites, stored on an email device) is further encrypted in a secure Keychain device, and some of it cannot be recovered from a jailbreak.
  4. You can’t just plug your iPhone into your computer and download data from it (except photos). iOS now has the ability to install trusted connections from computers. In this case, a pair of cryptographic keys is created that allows a trusted computer to make backup copies of the phone. However, this capability can be covered by an additional corporate safety-net policy or a proprietary Apple Configurator add-on. Backup security is ensured by the ability to set a collapsible password (the password is required only for updating data from a backup copy; it is not important in the regular backup mode).
  5. Unlocking the iPhone is time-consuming. To unlock, you can use either a standard PIN code of four digits or a complex password. The only additional way to unlock the device is to break your finger. In this case, the implementation of the mechanism is such that the evildoer has very little ability to deal with it quickly. This data is encrypted and will be deleted from the device’s RAM after being disabled or re-enabled; after about an hour, as the device had never been unlocked; after five recent tests; in about an hour, if the user did not enter the password to unlock the device.

    iOS has an option that allows you to automatically delete data after ten recent login attempts. For BlackBerry 10, this option is no longer controlled by the operating system; for older versions of iOS (up to iOS 8.2) there are ways to get around it.

What do we have behind the koristuvach and with the turns?

iOS has synchronization with the cloud, which is connected, through the Apple iCloud cloud service. Zokrema, please save in iCloud:

  • backup copies of data to the device;
  • synchronized data - log of calls, notes, calendars, passwords in iCloud Keychain;
  • passwords and resource usage history for the Safari browser;
  • photographs and additional data.

All types of bad synchronization in iOS can be disabled by simply selecting iCloud and deactivating iCloud Drive. After this, the data will not be transmitted to Apple servers. They don’t care about the fact that certain mechanisms do not work intuitively (like a butt - to interfere with the synchronization of calls, you need to turn on iCloud Drive, the settings for synchronizing files and photos), outside the connection of bad servers All synchronization is turned off.

In iOS, there is a transfer mechanism for storing data (the system can present to the outside world the IDs of Wi-Fi and Bluetooth modules instead of recorded data).

Okay, how can you deal with malware? In iOS, the ability to install a cheap software is practically disabled. One by one, the problems occurred (through additions, collection of various tools for analysis), but they were quickly localized and corrected. Unfortunately, however, these programs were not able to get in touch: in iOS, there is the addition of reliable isolation both from the system itself and from other programs behind the help of an additional sandbox.

It is important to note that iOS has long implemented granular control over access permissions. You can strictly allow or block the skin addition from such things as the ability of robots to run in the background (in “pure” Android there is no such ability!), access to reinstallation, and so on. The presence of these adjustments allows you to effectively separate the connections from the side of the supplements, which have earned such connections with their main business (this is true both for the Facebook class and for the Angry Birds platform).

Apple regularly updates iOS on older devices, almost instantly (as compared to Android) correcting any problems found. In this case, the updates will arrive at the same time to all customers (I’ll remind you on the front line).

Well, starting from version 9, iOS is protected from man-in-the-middle class attacks with certificate replacement. And since the Elcomsoft laboratory managed to reverse the iCloud backup protocol for the 8th version of the system, it was not possible to implement it in the new OS due to technical reasons. On the one hand, we remove the guarantee of security of the data being transmitted; On the other hand, we are unable to reliably transfer information without sending “request” information to the server.

Extension is no longer available to participants

Option 1. Go to the “site” to read all the materials on the site

Membership with the entirety of the designated term will give you access to ALL Hacker materials, increase your personal savings and allow you to accumulate a professional Xakep Score rating!

The Jolla company, which develops Sailfish OS, announced the third version of its operating system. The presentation was held in Barcelona as part of MWC 2018.

In connection with this approach, we continued to hear about alternative Android and iOS mobile operating systems. We looked at it before, now it’s come to Sailfish.

Why is Nokia and Intel here?

It's a long story. 13 years ago began. So, in 2005, good old Nokia was famous for its, and the model she was not yet famous for her non-intimidation. In these early days of the mid-2000s, the Finnish manufacturer presented its gut computer Nokia 770. This is a revolutionary device: Wi-Fi for catching the Internet! There are VoIP and Google Talk services here.

The tablet supports the Jabber protocol! God, there is so much nostalgia in these words! Sales of the tablet are the best in November 2005. 770th running on the first version of Maemo – 2005OS. Nokia N800, N810, and also N900 were released later. All the stench was under the Maemo baths.

Maemo interface on Nokia N900

From Finland we move to the USA. In 2007, netbooks with Intel Atom processors were coming out. The company wants to sell these devices, which require an operating system that is not very resource-rich. Windows is not suitable - Microsoft is stupidly useless Atom. This is the Moblin project. The name is short for Mobile Linux. As you might guess, the new operating system is insured on the mobile device. It was based on open source Linux output code.


Moblin interface

Unfortunately, in 2010, Nokia and Intel announced the addition of zusil. The operating system, which is rapidly fragmenting, has been renamed MeeGo. It was then announced that the Nokia N8 will become the only smartphone running on Symbian OS (a different Nokia operating system installed on most devices), and the N9 will also be released under MeeGo.


Nokia N9 on MeeGo

It was even cooler: customers could choose between devices on iOS, Android, Windows Phone, MeeGo, or even buy a BlackBerry! Alas, it’s a pity that such an idyll did not last long.

In 2011, Nokia unexpectedly closed MeeGo. They stopped developing the project, not caring about the popularity of the Nokia N9. Thus, the first smartphone on this version of the OS has become the last one.

Part of the team that developed MeeGo left Nokia to create a powerful company. They were named Jolla. The team was unable to remove most of the patents for the operating system from its existing system, so many elements had to be developed anew. For example, design.

How did Jolla try to get away?

The company talked about its richness of tasks and openness. At the time of the first presentation, they decided to release an SDK for development by third-party software developers. An operating system with a variety of capabilities for personalization and support for high-core processors, which may come in the future.


They also said something on the interface. Thus, Mark Dillon, the company’s CEO, said: “The Sailfish OS interface is unique in that it can be used only with the help of gestures.” With any program, swipe right-handed - the notification center will open. At the bottom, a list of installed programs opens. There were a lot of gestures. All of them replaced the primary buttons. Until now, the developers of Android smartphones are trying to come and see the on-screen buttons that “look” on part of the screen.

In 2012, the company announced its Jolla smartphone. Vіn nadіyshov in sales per rik. The device showed an unusual external appearance. It seemed that there was no gluing from two different smartphones. A few years later, the Jolla Tablet was announced, but the company was facing financial difficulties. The tablet was not released.


Why is Jolla still alive?

From then on, the company decided to focus on its operating system, Sailfish OS. For example, firmware development for the Nexus 4 and OnePlus One smartphones was carried out at Jolla.

In 2016, the company licensed Sailfish OS for the Russian “Hidden Mobile Platform”. Sailfish Mobile OS RUS was released in quick succession. The list of devices to be supported includes the Ermak OMP smartphone for government officials and corporate clients, as well as the Russian INOI R7 smartphone. Similar Russian licensed OS operating systems are available in Brazil, China and other countries.


Yermak ZMU

The third version of Sailfish will be insured for a larger number of devices. At MWC they announced the release of the INOI R7, Sony Xperia XA2, Gemini PDA PDA, as well as unnamed push-button phones with 4G support. Sailfish OS 3 has no problem. For example, if you suddenly spend money or steal something, you can remotely erase all data.

The operating system supports Android programs, but only in the case where customers pay 50 dollars for Sailfish OS.


Sony Xperia XA2 with Sailfish OS installed

The dominance of two operating systems on the market is not the best situation for a business owner. In this case, technological progress, as we believe, will be blocked by interest until development. The more you choose, the better the outcome. We hope that Sailfish will develop as an alternative operating system and will soon find its niche, as the trimatim suggests.

The Sailfish operating system in Jolla is not ready to topple Android from its podium, but it still has a growing audience. This operating system based on Linux OS will remove a number of great innovations and will become available to a wider range of devices.

Jolla shared some details of Sailfish 3 at the Mobile World Congress this year. The company says that the remaining version of the OS will provide a 30-hundredth increase in productivity, new APIs and an updated system for running various Android programs. Sailfish OS is also great with new categories of devices, including push-button phones that do not support touch screens.

Jolla adds support for physical buttons and devices with low performance. There is also a boost to the landscape interface of the user interface, which you will need if you want to run Sailfish OS on the Gemini PDA (a new guts PC that looks like a crap laptop).

Other changes to Sailfish 3 include new themes, menus, animations and task-saving improvements, as well as VoLTE support. Jolla adds enterprise features, including mobile device support, communication encryption, and VPN integration. There is also a new function for remote blocking and cleaning, support for fingerprint scanners and functions for working with blockchain functions.

Today, Jolla, as before, focuses on smartphone manufacturers, mobile operators and corporate clients. However, the OS can also be installed on a variety of devices, including the Sony Xperia XA2 smartphone, which, of course, will be willing to pay $60 for a license.

The Russian company INOI also plans to launch 8-inch and 10-inch tablets that will run on Sailfish OS, but they will not be widely available outside Russia.

It looks like Sailfish 3 will be released in the third quarter of 2018.

I learned about the Symbian OS itself and about the Nokia company, which, perhaps, was a leader in the history of this OS, especially in its foundation. I realized that if Nokia had been more agile, I know that perhaps Symbian OS would have lost the main operating system on mobile devices and Android without conquering the market so easily. And Nokia, not Apple or Samsung, lost its flagship on the market.

That’s what the people from the Nokia company thought, they didn’t put up with the head of Android and in 2011 they created the Jolla company, and in 2012 they created the Sailfish OS operating system. In 2016, the Russian company “Hidden Mobile Platform” acquired Jolla. Sailfish OS is based on a Linux kernel with a plug-in based on Qt and Mer, and the program interface is built on QML and HTML5. The output code contains a code that allows enthusiasts to modify the OS and install it on other smartphones. Sailfish OS is adapted to fit many popular devices, such as below.

List of devices

  • X909 (find5)
  • Oneplus One (bacon)
  • Galaxy Nexus (maguro)
  • Galaxy Note (n7000)
  • Galaxy Tab 2 Wifi (p3110)
  • Huawei Ascend P6 (hwp6_u06)
  • Nexus One (passion)
  • Nexus 4 (mako)
  • Nexus 5 (hammerhead)
  • Nexus 7 WiFi 2012 (grouper)
  • Nexus 7 GSM 2012 (tilapia)
  • Nexus 7 2013 WiFi (flo)
  • Nexus 7 2013 GSM (deb)
  • SGSIII Intl (i9300)
  • SGS III 4G (i9305)
  • Motorola Moto G 2013 (falcon)
  • Motorola Moto G 2014 (titan)
  • Huawei C8813Q/G525
  • Motorola Photon Q (xt897)
  • HTC Desire HD (ace)
  • HTC Desire Z (vision)
  • HTC Sensation (pyramid)
  • Sony Xperia L C2105
  • Sony Xperia SP (huashan)
  • Sony Ericsson Xperia Pro (iyokan)
  • Sony Xperia Z1 Compact (Amami)
  • Sony Xperia Z3 compact (aries/z3c)
  • Huawei C8813Q/G525
  • Samsung Galaxy Tab (P1000)
  • Samsung Galaxy SIII Mini (GT-I8190)
  • Sony Xperia Z (yuga)
  • Samsung Galaxy XCover 2 (GT-S7710)
  • ZTE Open C/Kis 3 (kis3)
  • Xiaomi Redmi 1S (armani)
  • Samsung Galaxy Tab 2 10.1 3G (GT-P5100)

[burn]

U Jolla has its own smartphones/tablets, licensedinstallations of other vibrators.

Sailfish OS offers the ability to work with Android apps on your Jolla smartphone. In this way, you can continue to vikorize your favorite programs, such as Instagram, Facebook, WhatsApp or Twitter.

Retailers emphasize respect when using the device on gestures. From this site:

Carry out

MOVE WITH EASE

To return to the main screen from programs, swipe from the edge of the screen to the center. To close the program, simply move the animal down.

Take a look

RUCHNI DEMORIES

Pull

PULL AND LEAVE, VIBRAVE DIA

The camera has been increased, the buzzer has increased and there are even more opportunities in the top menu - to pull the beast to the bottom.

The company "Authored Mobile Platform" (OMP) is developing a new OS based on Sailfish OS Sailfish Mobile OS RUS. We are committed to releasing the Oysters and Jolla devices under the Sailfish Mobile OS RUS, as well as the commercial smartphone “Yermak OMP” for corporate investors and the government sector until the end of the year.