Nine steps for securing an Android tablet
Set One App for One Function
The average tablet includes so many services that some are redundant. For example, a book downloaded from the Play Store is read within the Play Store, whereas ones downloaded from Kobo or Kindle are each downloaded in separate apps. Similarly, the manufacturer often offers a web browser, even though Chrome is bundled with the tablet.
In the interests of minimizing access, set default applications for each function whenever possible, and uninstall the rest. You may be unable to delete default apps without rooting your tablet (see below), but most can be disabled, if nothing else (Figure 6).
Replace the Default Mail App
Email has always been a major source of malware, to say nothing of spam. However, the default email reader on most tablets offers no anti-spam or filtering, although it does allow signed and encrypted email. Check the Play Store for an alternative mail app that includes security features (Figure 7). Alternatively, exclusively use Gmail, which is probably already installed, and disable the default reader.
Root Your Device or Install CyanogenMod
As you explore your tablet, you may notice that your account has limited access. For example, you cannot view some directories on the hard drive such as /sbin
or delete some default apps. Neither can you delete the unsecured Guest user account or install an effective firewall.
Technophiles and consumer advocates alike decry this situation. As a result, third-party tools have been developed for rooting – that is, for getting full root access on Android devices (on iOS devices, the same process is called jailbreaking).
Rooting's legal status varies with your location. It may invalidate your warranty in some areas, and it runs a small risk of making your tablet permanently useless. For these reasons, you should research rooting thoroughly before attempting it, searching the Internet for specific instructions for your tablet's manufacturer, model, and Android version. You might also want to look for first-hand accounts of rooting to determine your odds of success.
If you do root your tablet, you will be able not only to use apps that require rooting, which include more thorough security, but also to explore the Android operating system more thoroughly. After rooting, you might want to install a terminal emulator, as well as vi or emacs to help you explore.
As an alternative to rooting your tablet, consider modding, that is, installing CyanogenMod [1], an open source version of Android. CyanogenMod has the same benefits and risks as rooting, but it comes with an installer that automates the install process. Both rooting and installing CyanogenMod will give you the final degree of control you need to make your tablet secure.
« Previous 1 2 3 4 Next »
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Latest Cinnamon Desktop Releases with a Bold New Look
Just in time for the holidays, the developer of the Cinnamon desktop has shipped a new release to help spice up your eggnog with new features and a new look.
-
Armbian 24.11 Released with Expanded Hardware Support
If you've been waiting for Armbian to support OrangePi 5 Max and Radxa ROCK 5B+, the wait is over.
-
SUSE Renames Several Products for Better Name Recognition
SUSE has been a very powerful player in the European market, but it knows it must branch out to gain serious traction. Will a name change do the trick?
-
ESET Discovers New Linux Malware
WolfsBane is an all-in-one malware that has hit the Linux operating system and includes a dropper, a launcher, and a backdoor.
-
New Linux Kernel Patch Allows Forcing a CPU Mitigation
Even when CPU mitigations can consume precious CPU cycles, it might not be a bad idea to allow users to enable them, even if your machine isn't vulnerable.
-
Red Hat Enterprise Linux 9.5 Released
Notify your friends, loved ones, and colleagues that the latest version of RHEL is available with plenty of enhancements.
-
Linux Sees Massive Performance Increase from a Single Line of Code
With one line of code, Intel was able to increase the performance of the Linux kernel by 4,000 percent.
-
Fedora KDE Approved as an Official Spin
If you prefer the Plasma desktop environment and the Fedora distribution, you're in luck because there's now an official spin that is listed on the same level as the Fedora Workstation edition.
-
New Steam Client Ups the Ante for Linux
The latest release from Steam has some pretty cool tricks up its sleeve.
-
Gnome OS Transitioning Toward a General-Purpose Distro
If you're looking for the perfectly vanilla take on the Gnome desktop, Gnome OS might be for you.