๐ŸŒŒ
Privacy Village Academy
Join The Community!AcademyAbout HGPE
  • Hitchhiker's Guide to Privacy Engineering
    • โ“What is HGPE?
      • โš–๏ธWho is this for?
      • ๐Ÿง™โ€โ™‚๏ธPrivacy Engineering
      • ๐ŸŽจCreative Privacy
      • ๐Ÿ”ฎGenerative AI
      • ๐Ÿง‘โ€๐Ÿ’ปAbout the Author
  • ๐Ÿง™โ€โ™‚๏ธThe Ethical AI Governance Playbook 2025 Edition
    • ๐Ÿค–Chapter 1 : AI Literacy
    • ๐ŸŒChapter 2 : AI Governance in the 21st Century
    • โŒ›Chapter 3 - Getting Started with AI Act Compliance
    • ๐Ÿš€Chapter 4 : Rise of AI Governance: Building Ethical & Compliant AI
    • Chapter 5 : Introduction to the Lifecycle of AI
  • ๐ŸŽ“Privacy Engineering Field Guide Season 1
    • โ“Decoding the Digital World: Exploring Everyday Technology
    • ๐Ÿ‘๏ธIntroduction: Why Privacy Matters?
      • Age of Mass Surveillance
      • Privacy & Democracy
      • Privacy & Government Surveillance
    • โšกChapter 1 : How Computers Work?
      • Electricity
      • Bits
      • Logic Gates
      • Central Processing Unit (CPU)
      • Graphic Processing Unit (GPU)
      • Motherboard
      • Data Storage
      • Databases
      • Operating System (OS)
      • Computer Code
      • Programming Languages
      • The File System
      • Bugs and Errors
      • Computer Virus
      • Internet of Things (IoT)
      • Cloud Computing
    • ๐Ÿ›ฐ๏ธChapter 2 : How the internet works?
      • Physical Infrastructure
      • Network and Protocols
      • Switch
      • Routers
      • IP Address
      • Domain Name System (DNS)
      • Mac Address
      • TCP / IP
      • OSI Model
      • Packets
      • The Client - Server Architecture
      • Secure Socket Shell (SSH)
      • Transport Layer Security (TLS)
      • Firewall
      • Tunnels and VPNs
      • Proxy Server
    • ๐Ÿ–ฅ๏ธChapter 3 : How Websites Work?
      • HTML
      • CSS
      • Javascript
      • Web Server
      • Browser
      • HTTP
      • Databases
      • Front End (Client Side)
      • Back End (Server Side)
      • Cookies
      • Local Storage
      • Session Storage
      • IndexedDB
      • XHR Requests
      • Web APIs
      • Webhooks
      • Email Server
      • HTTPS
      • Web Application Firewall
      • Single Sign-on (SS0)
      • OAuth 2.0
      • Pixels
      • Canvas Fingerprinting
      • Email Tracking
      • Containers
      • CI/CD
      • Kubernetes
      • Serverless Architecture
    • โš›๏ธChapter 4 : How Quantum Computers Work?
      • Quantum Properties
      • Quantum Bits (Qubits)
      • Decoherence
      • Quantum Circuits
      • Quantum Algorithms
      • Quantum Sensing
      • Post-Quantum Cryptography
    • ๐Ÿ“ณChapter 5 : Mobile Apps and Privacy
      • Battery
      • Processor
      • Mobile Operating Systems
      • Mobile Data Storage
      • Cellular Data
      • Mobile Device Sensors
      • Wireless Connectivity
      • Camera & Microphone
      • Mobile Apps
      • Software Development Kits (SDKs)
      • Mobile Device Identifiers
      • Bring Your Own Device (BYOD)
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธPrivacy Engineering Field Guide Season 2
    • โ“Introduction to Privacy Engineering for Non-Techs
      • ๐ŸŽญChapter 1 : Digital Identities
        • What is identity?
        • Authentication Flows
        • Authentication vs. Authorization
        • OAuth 2.0
        • OpenID Connect (OIDC)
        • Self Sovereign Identities
        • Decentralized Identifiers
        • eIDAS
      • ๐Ÿ‘๏ธโ€๐Ÿ—จ๏ธChapter 2 : De-Identification
        • Introduction to De-Identification?
        • Input / Output Privacy
        • De-identification Strategies
        • K-Anonymity
        • Differential Privacy
        • Privacy Threat Modeling
  • ๐Ÿ“–HGPE Story and Lore
    • ๐ŸชฆChapter 1 : The Prologue
    • โ˜„๏ธChapter 2 : Battle for Earth
    • ๐Ÿฆ Chapter 3 : A Nightmare To Remember
    • ๐Ÿง™โ€โ™‚๏ธChapter 4 : The Academy
    • ๐ŸŒƒChapter 5: The Approaching Darkness
    • โš”๏ธChapter 6 : The Invasion
    • ๐ŸฐChapter 7 : The Fall of the Academy
    • ๐Ÿ›ฉ๏ธChapter 8 : The Escape
    • ๐ŸชChapter 9 : The Moon Cave
    • ๐Ÿฆ‡Chapter 10: Queen of Darkness
  • ๐Ÿ“บVideos, Audio Book and Soundtracks
    • ๐ŸŽงReading Episodes
    • ๐ŸŽนSoundtracks
  • ๐Ÿ‘พHGPE Privacy Games and Challenges
    • ๐ŸŽฎData Privacy Day'23 / Privacy Treasure Hunt Game
    • ๐ŸงฉPrivacy Quest
  • ๐Ÿ“ฌSubscribe Now!
Powered by GitBook
On this page
  • What are mobile operating systems?
  • Android
  • iOS
  • Privacy and Mobile OS
  • What are App permissions?
  • App Tracking Transparency
  • Encryption
  • Privacy-focused Features

Was this helpful?

  1. Privacy Engineering Field Guide Season 1
  2. Chapter 5 : Mobile Apps and Privacy

Mobile Operating Systems

PreviousProcessorNextMobile Data Storage

Last updated 2 years ago

Was this helpful?

What are mobile operating systems?

Operating systems are responsible for managing the phone's various components and data, as well as providing access to apps and other software.

There are two dominant mobile operating systems in the market: Google's and Apple's .

Android

Android is an open-source operating system developed by Google. It is used by a wide range of device manufacturers and is available on smartphones, tablets, smartwatches, and other devices.

Android also includes a range of built-in features, such as Google Assistant, Google Maps, and Google Drive, as well as support for third-party apps.

iOS

iOS is a proprietary operating system developed by Apple for its range of mobile devices, including the iPhone, iPad, and iPod Touch.

Applications can be distributed through the Apple App Store, which provides a range of built-in features such as Siri, Apple Maps, and iCloud, as well as support for third-party apps. iOS also includes a range of security features, such as Touch ID and Face ID, to help protect user data.

Privacy and Mobile OS

Overall, both iOS and Android have made significant strides in improving privacy features in their respective operating systems.

While iOS is generally considered to be more secure and privacy-focused, Android offers greater flexibility and customization options for users who are willing to take the time to configure their settings.

What are App permissions?

Both iOS and Android allow users to control app permissions, such as access to location, contacts, and cameras. However, iOS is generally considered to be more strict in this regard, with more granular control over app permissions.

For example, iOS requires apps to explicitly ask for permission to access the microphone, whereas Android grants microphone access by default.

App Tracking Transparency

Apple's cross-app tracking feature is opt-in only.

This means that apps cannot track a user's activity across other apps and websites unless the user explicitly grants permission. Users can choose to allow tracking for specific apps or deny tracking altogether.

Encryption

Both iOS and Android support the encryption of user data, but iOS is generally considered to be more secure in this regard.

iOS encrypts user data both in transit and at rest, while Android only encrypts user data at rest by default (although encryption can be enabled for data in transit).

Privacy-focused Features

Both iOS and Android have added privacy-focused features in recent years, such as App Tracking Transparency in iOS and Privacy Dashboard in Android.

Android works by allowing developers to create applications using the and then distributing them through the Google Play Store.

Apple's cross-app tracking feature is a privacy feature that was introduced in . It requires apps to ask for user permission before they can track their activity across other apps and websites.

However, iOS is generally considered to have more privacy-focused features, such as , which encrypts all internet traffic leaving the device.

Android SDK (Software Development Kit)
iOS 14.5
Private Relay
๐ŸŽ“
๐Ÿ“ณ
Android
iOS
They heard strange voices from the cyborgs they killed at the entrance of the moon cave and saw that they were mutating. Lilith was possessing their corpses to take physical form twisting the corpses by manipulating the Shadow Matter mutations. Red knew that they had to act quickly. She asked Kyle to prepare the ship for their escape while she held off Lilith. Kyle was hesitant, but he knew that it was their only chance. - Journals of Order of Epoch
Page cover image