How are the android profiles isolated?

We all know you can create user profiles for isolation, etc etc. But what’s being used to isolate? Where can I find the specific description of how this isolation is being implemented?

ex-AOSP tinkerer here

That’s a super broad question. For a technical overview, see section 4.3 of this paper by Android engs.

If you want to get (a bit outdated but still relevant) implementation level understanding, then I’d recommend reading (or chatting about it with a capable LLM) Chapter 4 of Android Security Internals by Nikolay Elenkov.

If you have any targeted questions, do post them.

2 Likes