We all know you can create user profiles for isolation, etc etc. But what’s being used to isolate? Where can I find the specific description of how this isolation is being implemented?
ex-AOSP tinkerer here
That’s a super broad question. For a technical overview, see section 4.3 of this paper by Android engs.
If you want to get (a bit outdated but still relevant) implementation level understanding, then I’d recommend reading (or chatting about it with a capable LLM) Chapter 4 of Android Security Internals by Nikolay Elenkov.
If you have any targeted questions, do post them.