Nine steps for securing an Android tablet
Set One App for One Function
The average tablet includes so many services that some are redundant. For example, a book downloaded from the Play Store is read within the Play Store, whereas ones downloaded from Kobo or Kindle are each downloaded in separate apps. Similarly, the manufacturer often offers a web browser, even though Chrome is bundled with the tablet.
In the interests of minimizing access, set default applications for each function whenever possible, and uninstall the rest. You may be unable to delete default apps without rooting your tablet (see below), but most can be disabled, if nothing else (Figure 6).

Replace the Default Mail App
Email has always been a major source of malware, to say nothing of spam. However, the default email reader on most tablets offers no anti-spam or filtering, although it does allow signed and encrypted email. Check the Play Store for an alternative mail app that includes security features (Figure 7). Alternatively, exclusively use Gmail, which is probably already installed, and disable the default reader.
Root Your Device or Install CyanogenMod
As you explore your tablet, you may notice that your account has limited access. For example, you cannot view some directories on the hard drive such as /sbin
or delete some default apps. Neither can you delete the unsecured Guest user account or install an effective firewall.
Technophiles and consumer advocates alike decry this situation. As a result, third-party tools have been developed for rooting – that is, for getting full root access on Android devices (on iOS devices, the same process is called jailbreaking).
Rooting's legal status varies with your location. It may invalidate your warranty in some areas, and it runs a small risk of making your tablet permanently useless. For these reasons, you should research rooting thoroughly before attempting it, searching the Internet for specific instructions for your tablet's manufacturer, model, and Android version. You might also want to look for first-hand accounts of rooting to determine your odds of success.
If you do root your tablet, you will be able not only to use apps that require rooting, which include more thorough security, but also to explore the Android operating system more thoroughly. After rooting, you might want to install a terminal emulator, as well as vi or emacs to help you explore.
As an alternative to rooting your tablet, consider modding, that is, installing CyanogenMod [1], an open source version of Android. CyanogenMod has the same benefits and risks as rooting, but it comes with an installer that automates the install process. Both rooting and installing CyanogenMod will give you the final degree of control you need to make your tablet secure.
« Previous 1 2 3 4 Next »
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Direct Download
Read full article as PDF:
Price $2.95
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
News
-
Mageia 9 Beta 2 is Ready for Testing
The latest beta of the popular Mageia distribution now includes the latest kernel and plenty of updated applications.
-
KDE Plasma 6 Looks to Bring Basic HDR Support
The KWin piece of KDE Plasma now has HDR support and color management geared for the 6.0 release.
-
Bodhi Linux 7.0 Beta Ready for Testing
The latest iteration of the Bohdi Linux distribution is now available for those who want to experience what's in store and for testing purposes.
-
Changes Coming to Ubuntu PPA Usage
The way you manage Personal Package Archives will be changing with the release of Ubuntu 23.10.
-
AlmaLinux 9.2 Now Available for Download
AlmaLinux has been released and provides a free alternative to upstream Red Hat Enterprise Linux.
-
An Immutable Version of Fedora Is Under Consideration
For anyone who's a fan of using immutable versions of Linux, the Fedora team is currently considering adding a new spin called Fedora Onyx.
-
New Release of Br OS Includes ChatGPT Integration
Br OS 23.04 is now available and is geared specifically toward web content creation.
-
Command-Line Only Peropesis 2.1 Available Now
The latest iteration of Peropesis has been released with plenty of updates and introduces new software development tools.
-
TUXEDO Computers Announces InfinityBook Pro 14
With the new generation of their popular InfinityBook Pro 14, TUXEDO upgrades its ultra-mobile, powerful business laptop with some impressive specs.
-
Linux Kernel 6.3 Release Includes Interesting Features
Although it's not a Long Term Release candidate, Linux 6.3 includes features that will benefit end users.