Assigned
Status Update
Comments
ba...@google.com <ba...@google.com> #2
Thank you for reporting this issue. For us to further investigate this issue, please provide the following additional information:
-
Are you reporting this as a Developer or User?
-
Please confirm if you are using any third party application as a launcher?
-
Could you please provide a screen record of the issue for us to further investigate?
Note: Please upload the files to google drive and share the folder to
ya...@gmail.com <ya...@gmail.com> #3
- I am a User
- No third party launcher using Default pixel launcher
- I cannot for now recreate the bug but will enable screen record and upload when caught
ba...@google.com <ba...@google.com> #4
Thank you for your response.
Once you are able to reproduce this bug, please upload the screen record of the issue.
Description
That's where our new feature comes in – Temporary Access. With this innovative feature, users can grant limited access to sensitive information for specific apps, allowing them to share their device with others while minimizing the risk of data exploitation.
How it works
Temporary Access allows users to grant temporary access to specific permissions, such as:
Contacts: Users can grant friends or family members permission to view their contacts for a short period.
Phone: Users can allow others to make and receive calls on their device for a limited time.
SMS: Users can share their SMS messages with others for a brief duration.
Music: Users can grant access to their music library for a specific app or service, allowing them to listen to music together without sharing the entire library.
Gallery: Users can allow friends or family members to view their photos and videos for a short period.
Temporary Access Settings.
To provide users with more control over their temporary access settings, we're introducing a new panel within the Settings app:
Grant Temporary Access (On/Off): Users can toggle this feature on or off to decide how they want to share their device's sensitive information.
Specific Permission Selection: Users can choose which permissions they want to grant temporarily, and for how long.
App-Specific Settings: Users can configure specific app settings, such as which apps are allowed to access their contacts or music library.
Benefits
By introducing Temporary Access, we're empowering users to:
Share devices securely: Users can share their device with others while minimizing the risk of data exploitation.
Enjoy private experiences: With Temporary Access, users can maintain their online privacy and security, even when sharing their device with others.
Simplify device sharing: Granting temporary access eliminates the need for users to reset permissions or reconfigure settings every time they share their device.
Use cases.
Temporary Access has numerous use cases:
Sharing devices with friends and family: Users can grant limited access to sensitive information for short periods, making it easier to share their device with loved ones.
Collaborative work: Teams and individuals can use Temporary Access to collaborate on projects, sharing files and data temporarily until the project is complete.
Event tickets and passes: Users can grant temporary access to event tickets or passes, allowing others to access information for a short period.
Advantages
Temporary Access offers several advantages:
Improved user experience: By simplifying device sharing and reducing the need for complex permission management, Temporary Access enhances the overall user experience.
Enhanced security: Users can maintain their online privacy and security by only granting temporary access to sensitive information.
Increased flexibility: Temporary Access allows users to grant limited access to specific permissions, making it easier to share devices with others or collaborate on projects.
Technical implementation.
To implement Temporary Access, we'll:
Develop advanced permission management systems: Our system will utilize sophisticated permission management techniques to securely grant and revoke temporary access.
Integrate with device sensors and network protocols: Android 16 will work in conjunction with device sensors (e.g., GPS, accelerometer) and network protocols (e.g., DNS, DHCP) to provide accurate and timely permission's management.
Collaborate with security experts: We'll partner with renowned security experts to ensure the feature is robust and secure.