Close Menu
Ztoog
    What's Hot
    Crypto

    ConsenSys Announces SEC Closure of Ethereum 2.0 Inquiry

    Technology

    8 Sriracha Alternatives to Get You Through the Shortage – LifeSavvy

    Mobile

    AT&T is offering the Pixel Fold for half the price

    Important Pages:
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    Facebook X (Twitter) Instagram Pinterest
    Facebook X (Twitter) Instagram Pinterest
    Ztoog
    • Home
    • The Future

      What is Project Management? 5 Best Tools that You Can Try

      Operational excellence strategy and continuous improvement

      Hannah Fry: AI isn’t as powerful as we think

      FanDuel goes all in on responsible gaming push with new Play with a Plan campaign

      Gettyimages.com Is the Best Website on the Internet Right Now

    • Technology

      Iran war: How could it end?

      Democratic senators question CFTC staffing cuts in Chicago enforcement office

      Google’s Cloud AI lead on the three frontiers of model capability

      AMD agrees to backstop a $300M loan from Goldman Sachs for Crusoe to buy AMD AI chips, the first known case of AMD chips used as debt collateral (The Information)

      Productivity apps failed me when I needed them most

    • Gadgets

      macOS Tahoe 26.3.1 update will “upgrade” your M5’s CPU to new “super” cores

      Lenovo Shows Off a ThinkBook Modular AI PC Concept With Swappable Ports and Detachable Displays at MWC 2026

      POCO M8 Review: The Ultimate Budget Smartphone With Some Cons

      The Mission: Impossible of SSDs has arrived with a fingerprint lock

      6 Best Phones With Headphone Jacks (2026), Tested and Reviewed

    • Mobile

      Android’s March update is all about finding people, apps, and your missing bags

      Watch Xiaomi’s global launch event live here

      Our poll shows what buyers actually care about in new smartphones (Hint: it’s not AI)

      Is Strava down for you? You’re not alone

      The Motorola Razr FIFA World Cup 2026 Edition was literally just unveiled, and Verizon is already giving them away

    • Science

      Big Tech Signs White House Data Center Pledge With Good Optics and Little Substance

      Inside the best dark matter detector ever built

      NASA’s Artemis moon exploration programme is getting a major makeover

      Scientists crack the case of “screeching” Scotch tape

      Blue-faced, puffy-lipped monkey scores a rare conservation win

    • AI

      Online harassment is entering its AI era

      Meet NullClaw: The 678 KB Zig AI Agent Framework Running on 1 MB RAM and Booting in Two Milliseconds

      New method could increase LLM training efficiency | Ztoog

      The human work behind humanoid robots is being hidden

      NVIDIA Releases DreamDojo: An Open-Source Robot World Model Trained on 44,711 Hours of Real-World Human Video Data

    • Crypto

      SEC Vs. Justin Sun Case Ends In $10M Settlement

      Google paid startup Form Energy $1B for its massive 100-hour battery

      Ethereum Breakout Alert: Corrective Channel Flip Sparks Impulsive Wave

      Show Your ID Or No Deal

      Jane Street sued for alleged front-running trades that accelerated Terraform Labs meltdown

    Ztoog
    Home » Google’s New Feature Ensures Your Pixel Phone Hasn’t Been Hacked. Here’s How It Works | WIRED
    Gadgets

    Google’s New Feature Ensures Your Pixel Phone Hasn’t Been Hacked. Here’s How It Works | WIRED

    Facebook Twitter Pinterest WhatsApp
    Google’s New Feature Ensures Your Pixel Phone Hasn’t Been Hacked. Here’s How It Works
| WIRED
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp

    If you consider all the companies concerned in sustaining the software program in your cellphone, from particular person app builders to firms comparable to Google, that is lots of assault surfaces for hackers to think about. These sorts of assaults are on the rise too. All of this does not even contemplate the secondhand market as nicely, the place used and refurbished Android gadgets (and particularly Pixel telephones, on this case) bought by prior homeowners include no such ensures that they are contemporary installations of Android which might be secure and away from malware.

    Google’s Android Fixes

    A Merkle tree is used to confirm software program.

    Courtesy of David Nield

    In easy phrases, the brand new Pixel Binary Transparency checks the Android working system on a Pixel cellphone to ensure the code is strictly accurately. It’s a bit like checking the authenticity of a portray, searching for indicators of tampering, or checking that each one the workplace doorways and home windows are locked on the finish of the day. Google has written concerning the new characteristic in a weblog publish, and it says the characteristic will probably be constructed upon sooner or later.

    More particularly, the brand new Android security measure makes use of public cryptographic logs—digital bookkeeping methods—to indicate what a Pixel set up ought to appear like. Entries will be appended to those logs when new software program is launched, however they can not be modified or deleted. In different phrases, any unauthorized edits are going to face out.

    The logs use what’s often known as a Merkle tree to take care of the integrity of the information inside them, a cryptographic construction that accelerates the method of checking massive quantities of knowledge for any tampering. The method implies that a lot smaller parts of knowledge will be analyzed to determine whether or not or not any adjustments have been made.

    While Google itself admits that the majority customers will not want the Pixel Binary Transparency characteristic due to the opposite safeguards already in place on Android, you possibly can in reality strive it out by yourself Pixel cellphone or pill. You’re going to should be acquainted with compiling code and utilizing the Android Debug Bridge (ADB) software program that allows you to analyze Android gadgets from a pc.

    Pixel Binary Transparency enhances the prevailing Android Verified Boot (AVB) safeguard, which works in an identical means. The on the spot that an Android system boots up, it appears to be like for a particular software program “signature” (a bit of like a password) verifying that each one is nicely, the software program is untampered with, and the boot course of can proceed. As with Pixel Binary Transparency, any tampering is nearly unimaginable to hide. At the identical time, AVB additionally protects the system from being rolled again to older, much less safe variations of Android.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp

    Related Posts

    Gadgets

    macOS Tahoe 26.3.1 update will “upgrade” your M5’s CPU to new “super” cores

    Gadgets

    Lenovo Shows Off a ThinkBook Modular AI PC Concept With Swappable Ports and Detachable Displays at MWC 2026

    Gadgets

    POCO M8 Review: The Ultimate Budget Smartphone With Some Cons

    Gadgets

    The Mission: Impossible of SSDs has arrived with a fingerprint lock

    Gadgets

    6 Best Phones With Headphone Jacks (2026), Tested and Reviewed

    Gadgets

    5 changes to know about in Apple’s latest iOS, macOS, and iPadOS betas

    Gadgets

    Lenovo Unveils AI-Enhanced Legion Y700 (2026): A New Benchmark For Compact Gaming Tablets

    Gadgets

    ASUS Vivobook S16 OLED Review: The Most Practical 16-inch Laptop Right Now

    Leave A Reply Cancel Reply

    Follow Us
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    Top Posts
    Gadgets

    Infineon Unveils Quad-Channel Digital Isolators For Automotive And Industrial Applications

    Infineon Technologies AG has expanded its ISOFACE product vary by introducing quad-channel digital isolators designed…

    Mobile

    Save up to $100 on these Marshall portable speakers

    Marshall speakers are among the many best-looking ones out there. They aren’t all the time…

    AI

    Technique could efficiently solve partial differential equations for numerous applications | Ztoog

    In fields reminiscent of physics and engineering, partial differential equations (PDEs) are used to mannequin…

    Gadgets

    WIRED Tested Miracle Hangover Cures. You’re Welcome

    Championed by English actress and feminine biohacker Davinia Taylor, Rise & Shine by Will Powders…

    Science

    The universe’s evolution seems to be slowing and we don’t know why

    The universe is evolving extra slowly than anticipatedJavier Zayas Photography by way of Getty Images…

    Our Picks
    Crypto

    $25B Market Cap Milestone Sparks Bullish Hopes for Monero

    Technology

    X appears to be rolling out a new mobile ad format that can't be reported or blocked, lacks an ad label and user profile, and doesn't disclose the advertiser (Matt Binder/Mashable)

    Mobile

    Leaked image gives first real-world look at Galaxy Z Flip 5 and its huge screen

    Categories
    • AI (1,560)
    • Crypto (1,827)
    • Gadgets (1,870)
    • Mobile (1,910)
    • Science (1,939)
    • Technology (1,862)
    • The Future (1,716)
    Most Popular
    AI

    Search algorithm reveals nearly 200 new kinds of CRISPR systems | Ztoog

    Crypto

    This Crypto Founder Believes Another Bitcoin Bull Run Is Close, Here’s Why

    Crypto

    Analyst Who Correctly Predicted Bitcoin’s Surge And Crash Reveals Where Price Is Headed Next

    Ztoog
    Facebook X (Twitter) Instagram Pinterest
    • Home
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    © 2026 Ztoog.

    Type above and press Enter to search. Press Esc to cancel.